Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Flexible, Reliable Software: Using Patterns and Agile Development (Chapman & Hall/CRC Textbooks in Computing)
Flexible, Reliable Software: Using Patterns and Agile Development (Chapman & Hall/CRC Textbooks in Computing)

Flexible, Reliable Software: Using Patterns and Agile Development guides students through the software development process. By describing practical stories, explaining the design and programming process in detail, and using projects as a learning context, the text helps readers understand why a given...

Practical SQL: A Beginner's Guide to Storytelling with Data
Practical SQL: A Beginner's Guide to Storytelling with Data

Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as...

Data Science For Dummies
Data Science For Dummies

Discover how data science can help you gain in-depth insight into your business – the easy way!

Jobs in data science abound, but few people have the data science skills needed to fill these increasingly important roles in organizations. Data Science For Dummies is the perfect starting point for IT professionals...

Learning SAP Analytics Cloud
Learning SAP Analytics Cloud

Key Features

  • Predict new opportunities and risks in a few mouse clicks
  • Eliminate complexity with tools that let you plan, analyze, and collaborate in context—in real time
  • Discover, visualize, plan, and predict in a single product with agile BI tools

Book...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Visualizing Quaternions (The Morgan Kaufmann Series in Interactive 3D Technology)
Visualizing Quaternions (The Morgan Kaufmann Series in Interactive 3D Technology)

Introduced 160 years ago as an attempt to generalize complex numbers to higher dimensions, quaternions are now recognized as one of the most important concepts in modern computer graphics. They offer a powerful way to represent rotations and compared to rotation matrices they use less memory, compose faster, and are naturally suited for...

Java Closures and Lambda
Java Closures and Lambda
This book is the culmination of many brash years and hard lessons. The story starts all the way back when I migrated from C++ into perl. The perl programming language was amazingly powerful compared to the low-level manipulations and bookkeeping of C++. (The fact that it was “slow” never bothered me – I would rather write...
The Agile Enterprise: Building and Running Agile Organizations
The Agile Enterprise: Building and Running Agile Organizations

Discover how to implement and operate in an Agile manner at every level of your enterprise and at every point from idea to delivery. Learn how Agile-mature organizations adapt nimbly to microchanges in market conditions. Learn cutting-edge practices and concepts as you extend your implementation of Agile through the entire enterprise to meet...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

JIRA 5.2 Essentials
JIRA 5.2 Essentials

Learn how to track bugs and issues, and manage your software development projects with JIRA

Overview

  • Learn how to set up JIRA for software development.
  • Effectively manage and handle software bugs and issues.
  • Includes updated JIRA content as well as coverage of the popular...
Result Page: 57 56 55 54 53 52 51 50 49 48 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy