Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Spring Web Flow 2 Web Development
Spring Web Flow 2 Web Development

Many web applications need to take the user through a defined series of steps such as e-commerce checkouts or user registrations. Spring Web Flow works well for rich and flexible user interaction, additionally it helps you to describe the flow of websites in complex processes. Spring Web Flow 2 provides the perfect way to build these kinds of...

XML Retrieval (Synthesis Lectures on Information Concepts, Retrieval & Services)
XML Retrieval (Synthesis Lectures on Information Concepts, Retrieval & Services)
Documents usually have a content and a structure. The content refers to the text of the document, whereas the structure refers to how a document is logically organized. An increasingly common way to encode the structure is through the use of a mark-up language. Nowadays, the most widely used mark-up language for representing structure is the...
Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Practical Guide to Testing Object-Oriented Software
Practical Guide to Testing Object-Oriented Software
Testing software is a very important and challenging activity. This is a book for
people who test software during its development. Our focus is on object-oriented
and component-based software, but you can apply many of the techniques
discussed in this book regardless of the development paradigm. We assume our
reader is familiar
...
Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)
Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)

Get the book that shows you not only what—but how—to study

  • 100% complete coverage of all official objectives for Sun Solaris exams CX-310-200 and CX-310-202
  • Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off...
Winning Results with Google AdWords, Second Edition
Winning Results with Google AdWords, Second Edition
Run a Profitable Google AdWords Campaign

Reach millions of targeted new customers at the precise moment theyAnd#39;re looking for the products and services youAnd#39;re selling with help from this hands-on guide. Winning Results with Google AdWords, Second Edition reveals the latest strategies for writing successful...

Urological Tests in Clinical Practice
Urological Tests in Clinical Practice

This is a concise pocket guide to urological investigative procedures. It reviews the indications and pitfalls of tests before they are requested and suggests which investigations should be performed in individual urological conditions. Cross-sectional and other radiological images help illustrate the main diagnostic features, and diagrams...

Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
Mastering Ext JS
Mastering Ext JS

In this book you'll learn to develop a complete application with ExtJS. Enhance your existing skills and get a better grasp of the JavaScript framework to create advanced Internet applications.

Overview

  • Build an application with Ext JS from scratch
  • Learn expert tips and...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine

Before digital computers ever existed, Alan Turing envisioned their power and versatility...but also proved what computers could never do.

In an extraordinary and ultimately tragic life that unfolded like a novel, Turing helped break the German Enigma code to turn the tide of World War II, later speculated on...

Electrician's Troubleshooting and Testing Pocket Guide, Third Edition
Electrician's Troubleshooting and Testing Pocket Guide, Third Edition
The ultimate electrical equipment troubleshooting pocket guide

Designed for quick reference at any job site, the Electrician's Troubleshooting and Testing Pocket Guide enables electricians using portable meters to test, maintain, and troubleshoot all types of electrical equipment and systems.

This updated...

unlimited object storage image
Result Page: 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy