Chapter 144 | Season 1 Episode 5 Mike Tyson vs. Terry Crews | Si Solo Pudiera Imaginar BluRayRip AC3 5.1
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Scientists at Work
Data Scientists at Work

Data Scientists at Work is a collection of interviews with sixteen of the world's most influential and innovative data scientists from across the spectrum of this hot new profession. "Data scientist is the sexiest job in the 21st century," according to the Harvard Business Review. By 2018, the United States will...

Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

Magento 2 - Build World-Class online stores
Magento 2 - Build World-Class online stores

Create rich and compelling solutions for Magento 2 by developing and implementing solutions, themes, and extensions

About This Book

  • Be proficient in the main functionalities, resources, and system structure of Magento 2
  • Get to grips with this practical and hands-on guide to raise your web...
Python How to Program (With CD-ROM)
Python How to Program (With CD-ROM)

The authoritative DEITEL LIVE-CODE introduction to Python programming

This new book by the world's leading programming language textbook authors carefully explains how to use Python as a general-purpose programming language and how to program multi-tier, client/server,...

Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Beautiful Data: The Stories Behind Elegant Data Solutions
Beautiful Data: The Stories Behind Elegant Data Solutions
In this insightful book, you'll learn from the best data practitioners in the field just how wide-ranging -- and beautiful -- working with data can be. Join 39 contributors as they explain how they developed simple and elegant solutions on projects ranging from the Mars lander to a Radiohead video.

With Beautiful
...
Enterprise & Small Business: Principles, Practice & Policy
Enterprise & Small Business: Principles, Practice & Policy

"This book is probably the best general small business text available at present." Dr Jonathan Lean, Principal Lecturer in Strategic Management, University of Plymouth Business School, UK Want to be at the cutting edge of this dynamic and exciting subject? This text delivers the latest research, current thinking and practice, and...

PowerShell Deep Dives
PowerShell Deep Dives

Summary

Here's your chance to learn from the best in the business. PowerShell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Editors Jeffery Hicks, Richard Siddaway, Oisin Grehan, and Aleksandar Nikolic hand-picked...

C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

Effective Prototyping with Excel: A practical handbook for developers and designers (Interactive Technologies)
Effective Prototyping with Excel: A practical handbook for developers and designers (Interactive Technologies)
Although recognized as a key to the design process, prototyping often falls victim to budget cuts, deadlines, or lack of access to sophisticated tools. This can lead to sloppy and ineffective prototypes or the abandonment of them altogether. Rather than lose this important step, people are turning to Microsoft Excel® to create effective,...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy