Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro JavaScript Performance: Monitoring and Visualization
Pro JavaScript Performance: Monitoring and Visualization

Performance is a hugely important area of web development. If your site runs slowly, users are going to leave, and the problem only grows as your site gets more popular. Pro JavaScript Performance gives you the tools you need to keep your sites smooth and responsive no matter how many users you have.

Best
...

High-Impact Human Capital Strategy: Addressing the 12 Major Challenges Today's Organizations Face
High-Impact Human Capital Strategy: Addressing the 12 Major Challenges Today's Organizations Face

Traditionally, human resources has focused on recruiting good people, preparing them for assignments, motivating them to perform, and retaining them. These functions remain essential, but to be successful in turbulent times like ours, human capital strategy needs to be broader and much more far-reaching. High-Impact Human Capital Strategy...

Web Security, Privacy and Commerce, 2nd Edition
Web Security, Privacy and Commerce, 2nd Edition
The World Wide Web has changed our world. More than half the people in the United States now use the Web on a regular basis. We use it to read today's news, to check tomorrow's weather, and to search for events that have happened in the distant past. And increasingly, the Web is the focus of the 21st century...
Network Protocols Handbook
Network Protocols Handbook
We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with...
Designing Embedded Processors: A Low Power Perspective
Designing Embedded Processors: A Low Power Perspective
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.

Increasingly, these systems have to consume little energy....

Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
Credit and Community: Working-Class Debt in the UK since 1880
Credit and Community: Working-Class Debt in the UK since 1880
Credit's centrality to the current economic crisis makes the publication of Sean O'Connell's social history of working-class credit consumption particularly timely. Although the credit crunch came too late to be included in this book, the portrait of a complex relationship between lenders and borrowers over the past 120 years should be required...
Architecture and Methods for Flexible Content Management in Peer-to-Peer Systems
Architecture and Methods for Flexible Content Management in Peer-to-Peer Systems

At times when the IT manager’s best friend is systems consolidation (which is a euphemism for centralisation), it may come somewhat as a surprise for you that this book investigates decentralisation in the context of content management systems. It may seem quite obvious
that content will and should be managed by the party who
...

Blender 3D Basics
Blender 3D Basics
When researching in preparation to write this book, we discovered that some Blender users try to learn Blender three times and give up twice before they become comfortable with Blender's effective, if unusual, interface. The editors at Packt and I decided that this was a problem that could be solved. The answer is to explain...
Use of Force: A Thriller (The Scot Harvath Series)
Use of Force: A Thriller (The Scot Harvath Series)

“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy

From #1 New York Times bestselling author Brad Thor.

As a storm rages across the Mediterranean Sea, a
...

iOS Penetration Testing: A Definitive Guide to iOS Security
iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure. 

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to
...
Scheduling Algorithms
Scheduling Algorithms
From the reviews of the fourth edition: 

"This is a book about scheduling algorithms. … The book contains eleven chapters. … Most of the chapters contain the summarized complexity results. In this edition the complexity columns have been updated. The book is completed by the bibliography which also has been updated and...

unlimited object storage image
Result Page: 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy