Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Oracle Essbase 9 Implementation Guide
Oracle Essbase 9 Implementation Guide

The hot new data analysis trends involve business intelligence and analytics. The technology that supports business intelligence and analytics better than anything else is today's multidimensional OLAP technology - and there is none better than Oracle Essbase! Although storing data in a cube and developing analytical applications leaves...

Codin' for the Web: A Designer's Guide to Developing Dynamic Web Sites
Codin' for the Web: A Designer's Guide to Developing Dynamic Web Sites

EVEN THE MOST SKILLED WEB DESIGNERS can find the complexities of creating a full-functioned Web site to be a daunting task. Here to help designers create sites that not only work, but work well and are easy to update and maintain is an easy-to-read guide to Web programming basics from best-selling author Charles Wyke-Smith. Just as architects...

Microsoft Silverlight 5 and Windows Azure Enterprise Integration
Microsoft Silverlight 5 and Windows Azure Enterprise Integration

Microsoft Silverlight is a powerful development platform for creating rich media applications and line of business applications for the web and desktop.

Microsoft Windows Azure is a cloud services operating system that serves as the development, service hosting, and service management environment for the Windows Azure platform.

...
Learning Cloudera Impala
Learning Cloudera Impala

Perform interactive, real-time in-memory analytics on large amounts of data using the massive parallel processing engine Cloudera Impala

Overview

  • Step-by-step guidance to get you started with Impala on your Hadoop cluster
  • Manipulate your data rapidly by writing proper SQL statements
  • ...
Pro Hibernate 3 (Expert's Voice)
Pro Hibernate 3 (Expert's Voice)

Pro Hibernate 3 is the first book to offer complete coverage of the open source lightweight Hibernate 3 and its new features. Authors Dave Minter and Jeff Linwood discuss the new persistence layer and share design tips and best practices. And the duo goes beyond just explaining "how to" use parts of Hibernate; they probe well...

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...

Mastering PostgreSQL 10: Expert techniques on PostgreSQL 10 development and administration
Mastering PostgreSQL 10: Expert techniques on PostgreSQL 10 development and administration

Master the capabilities of PostgreSQL 10 to efficiently manage and maintain your database

Key Features

  • Your one-stop guide to mastering advanced concepts in PostgreSQL 10 with ease
  • Master query optimization, replication, and high availability with PostgreSQL
  • ...
Microsoft SQL Server 2005 Integration Services
Microsoft SQL Server 2005 Integration Services

All medium to large companies have to deal with data being stored in a number of databases, spreadsheets and proprietary applications. Bringing all this data together into one system can be useful to analyzing the business; but can also be quite difficult to do. Integration Services is the next...

Game Engine Toolset Development
Game Engine Toolset Development
Toolset development is an extremely broad topic. Game Engine Toolset Development provides you with a core set of skills and a comprehensive insight that will aid you in the development of game engine utilities, significantly reducing the time period associated with the construction phase of a project. The book starts off with topics regarding...
The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
Persistence in PHP with Doctrine ORM
Persistence in PHP with Doctrine ORM

This book is designed for PHP developers and architects who want to modernize their skills through better understanding of Persistence and ORM. You'll learn through explanations and code samples, all tied to the full development of a web application.

Overview

  • Develop a fully functional Doctrine-backed...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy