Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Database Design (Wrox Beginning Guides)
Beginning Database Design (Wrox Beginning Guides)
Database design involves how to best structure the tables and queries that are used with databases in order to provide optimum performance, storage, manageability, and flexibility. With relational databases, you can use those tables to organize your data and retrieve information from your database. This book provides you with an easy-to-understand...
HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery (7th Edition)
HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery (7th Edition)

Thoroughly revised and updated with examples rewritten to conform to HTML5, CSS3, and contemporary web development practices, this easy-to-understand, step-by-step tutorial helps you quickly master the basics of HTML and CSS before moving on to more advanced topics such as graphics, video, and interactivity with...
Mutual Fund Industry Handbook : A Comprehensive Guide for Investment Professionals
Mutual Fund Industry Handbook : A Comprehensive Guide for Investment Professionals

A behind-the-scenes look at the mutual fund industry

With more than 8,000 funds, more than $8 trillion in assets, and more than 87 million individual investors at the end of 2004, mutual funds—professionally managed pooled investment vehicles that give people the opportunity to participate in the securities market without...

Advanced Image Processing in Magnetic Resonance Imaging (Signal Processing and Communications)
Advanced Image Processing in Magnetic Resonance Imaging (Signal Processing and Communications)
Magnetic Resonance (MR) imaging produces images of the human tissues in a noninvasive manner, revealing the structure, metabolism, and function of tissues and organs. The impact of this image technique in diagnostic radiology is impressive, due to its versatility and flexibility in joining high-quality anatomical images with functional...
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
It can be tough to roll out a pre-configured environment if you don't know what you're doing. We'll show you how to streamline your service options with Docker, so that you can scale in an agile and responsive manner.
Key Features
  • Learn how to structure your own Docker containers
  • ...
Social Media Tools in Experiential Internship Learning
Social Media Tools in Experiential Internship Learning

This book describes how a support structure can be built to enhance peer-to-peer (and also students-to-lecturers) communication and support. It informs lecturers on how they can decide if they should adopt one or more social media tools to facilitate students’ learning, communication, and support for an internship program. This...

A Practical Guide to Data Structures and Algorithms using Java
A Practical Guide to Data Structures and Algorithms using Java

Although traditional texts present isolated algorithms and data structures, they do not provide a unifying structure and offer little guidance on how to appropriately select among them. Furthermore, these texts furnish little, if any, source code and leave many of the more difficult aspects of the implementation as exercises. A fresh...

Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
Programming Microsoft ASP.NET MVC (3rd Edition) (Developer Reference)
Programming Microsoft ASP.NET MVC (3rd Edition) (Developer Reference)

Develop next-generation web applications with ASP.NET MVC

Go deep into the architecture and features of ASP.NET MVC 5, and learn how to build web applications that work well on both the desktop and mobile devices. Web development expert Dino Esposito takes you through the web framework’s Model-View-Controller (MVC)...

Learning Dart
Learning Dart

Dart is the programming language developed by Google that offers a new level of simple versatility. Learn all the essentials of Dart web development in this brilliant tutorial that takes you from beginner to pro.

Overview

  • Develop apps for the Web using Dart and HTML5
  • Build powerful HTML5...
Result Page: 174 173 172 171 170 169 168 167 166 165 164 163 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy