Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sas R 9.1.3 OLAP Server: MDX Guide
Sas R 9.1.3 OLAP Server: MDX Guide
Multidimensional Expressions (MDX) is a powerful syntax that enables you to query multidimensional objects and provide commands that retrieve and manipulate multidimensional data from those objects. MDX is designed to ease the process of accessing data from multiple dimensions. It addresses the conceptual differences between two-dimensional and...
C++ Design Patterns and Derivatives Pricing (Mathematics, Finance and Risk)
C++ Design Patterns and Derivatives Pricing (Mathematics, Finance and Risk)
'This is a short book, but an elegant one. It would serve as an excellent course text for a course on the practical aspects of mathematical finance.' International Statistical Institute

'This book is thought-provoking and rewarding. Even for the less experienced programmer, the presentation is readily accessible, and the coded examples
...
CEA-CompTIA DHTI+ Digital Home Technology Integrator All-In-One Exam Guide, Second Edition
CEA-CompTIA DHTI+ Digital Home Technology Integrator All-In-One Exam Guide, Second Edition
A CEA-CompTIA DHTI+ Exam Guide and Desktop Reference--All in One!.

Get complete coverage of all the material included on the CEA-CompTIA DHTI+ Digital Home Technology Integrator exam inside this comprehensive resource. Written by industry experts, this definitive exam guide features learning objectives at the beginning of each...

Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
Biological Data Mining (Chapman & Hall/Crc Data Mining and Knowledge Discovery Series)
Biological Data Mining (Chapman & Hall/Crc Data Mining and Knowledge Discovery Series)

Like a data-guzzling turbo engine, advanced data mining has been powering post-genome biological studies for two decades. Reflecting this growth, Biological Data Mining presents comprehensive data mining concepts, theories, and applications in current biological and medical research. Each chapter is written by a distinguished...

Drupal 6 Theming Cookbook
Drupal 6 Theming Cookbook

Themes are among the most powerful and flexible features available when it comes to the presentation of a website. The greatest strength of Drupal lies in its design which, when done correctly, allows developers and designers to customize and micromanage each and every aspect of the site. Furthermore, the Drupal theming system and its APIs...

CRM Fundamentals
CRM Fundamentals

Many of you reading this book are about to embark on the journey of implementing customer relationship management (CRM) software within your organization; some of you are completely new to CRM, while others have been through a CRM implementation with varied success. This book was written to provide business leaders and stakeholders with a...

Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems
Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems

This book presents a unique combination of mobile robots and embedded systems, from introductory to intermediate level. It is structured in three parts, dealing with embedded systems (hardware and software design, actuators, sensors, PID control, multitasking), mobile robot design (driving, balancing, walking, and flying robots), and mobile...

Transactions on Aspect-Oriented Software Development VIII
Transactions on Aspect-Oriented Software Development VIII

The history of software development paradigms suggests that a new paradigm often has its genesis in programming languages and then moves up to design and analysis (e.g., structured programming preceded structured design and analysis, and objectoriented programming predated object-oriented design and modeling). This same pattern can...

Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

Network Security Assessment
Network Security Assessment
Network Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by...
Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation
Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation
The Semantic Web vision of the World Wide Web Consortium (W3C) is comprised of four primary components: (1) expressing meaning, (2) knowledge representation, (3) ontology, and (4) agents. Expression of meaning is fundamental to the construction of the new “intelligent” Web. The current Web lacks mechanisms for expressing meaning and is...
unlimited object storage image
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy