Hindi Stories 2 (Pocket Book) | Slovakia | Russian Institute Lesson 2 Erotik Film izle
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
Unsupervised Learning with R
Unsupervised Learning with R

Work with over 40 packages to draw inferences from complex datasets and find hidden patterns in raw unstructured data

About This Book

  • Unlock and discover how to tackle clusters of raw data through practical examples in R
  • Explore your data and create your own models from scratch
  • ...
Google Visualization API Essentials
Google Visualization API Essentials

Make sense of your data: make it visual with the Google Visualization API

Overview

  • Wrangle all sorts of data into a visual format, without being an expert programmer.
  • Visualize new or existing spreadsheet data through charts, graphs, and maps.
  • Full of diagrams, core concept...
Embedded Systems Architecture for Agile Development: A Layers-Based Model
Embedded Systems Architecture for Agile Development: A Layers-Based Model

Utilize a new layers-based development model for embedded systems using Agile techniques for software architecture and management. Firmware is comprised of both hardware and software, but the applicability of Agile in embedded systems development is new. This book provides a step-by-step process showing how this is...

Expert Oracle RAC Performance Diagnostics and Tuning
Expert Oracle RAC Performance Diagnostics and Tuning

Expert Oracle RAC Performance Diagnostics and Tuning provides comprehensive coverage of the features, technology and principles for testing and tuning RAC databases. The book takes a deep look at optimizing RAC databases by following a methodical approach based on scientific analysis rather than using a speculative approach, twisting...

Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka

Learn how to integrate full-stack open source big data architecture and to choose the correct technology―Scala/Spark, Mesos, Akka, Cassandra, and Kafka―in every layer. 

Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting,...

BDD in Action: Behavior-driven development for the whole software lifecycle
BDD in Action: Behavior-driven development for the whole software lifecycle

Summary

BDD in Action teaches you the Behavior-Driven Development model and shows you how to integrate it into your existing development process. First you'll learn how to apply BDD to requirements analysis to define features that focus your development efforts on underlying business goals. Then,...

Creating Effective JavaHelp (Java Series)
Creating Effective JavaHelp (Java Series)

Effective, instantly available online help is a requirement for today's interactive applications. Until now, Java application developers have been forced to develop their own help system. That's no longer necessary. With the release of JavaHelp™, there is a complete and standard online help system for the Java™ platform....

MEMS and Microstructures in Aerospace Applications
MEMS and Microstructures in Aerospace Applications

The promise of MEMS for aerospace applications has been germinating for years, and current advances bring the field to the very cusp of fruition. Reliability is chief among the challenges limiting the deployment of MEMS technologies in space, as the requirement of zero failure during the mission is quite stringent for this burgeoning field....

Microsoft Exchange Server 2013 High Availability
Microsoft Exchange Server 2013 High Availability

Design a highly available Exchange 2013 messaging environment using real-world examples

Overview

  • Use the easy-to-follow guidelines and tips to achieve the highest availability
  • Covers all the aspects that need to be considered before, during and after implementation of high availability
  • ...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Mathematics of Economics and Business
Mathematics of Economics and Business
Today, a firm understanding of mathematics is essential for any serious student of economics. Students of economics need nowadays several important mathematical tools. These include calculus for functions of one or several variables as well as a basic understanding of optimization with and without constraints, e.g. linear programming plays an...
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy