Zum Film | Koi to Senkyo to Chocolate | Watch Movie
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Seven Web Frameworks in Seven Weeks: Adventures in Better Web Apps (Pragmatic Programmers)
Seven Web Frameworks in Seven Weeks: Adventures in Better Web Apps (Pragmatic Programmers)

Whether you need a new tool or just inspiration, Seven Web Frameworks in Seven Weeks explores modern options, giving you a taste of each with ideas that will help you create better apps. You'll see frameworks that leverage modern programming languages, employ unique architectures, live client-side instead of server-side, or embrace...

Zenoss Core 3.x Network and System Monitoring
Zenoss Core 3.x Network and System Monitoring

A step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system Designed to quickly acquaint you with the core feature so you can customize Zenoss Core to your needs Discover, manage, and monitor IT resources Build custom event-processing and alerting rules Write custom device reports to extract,...

Professional Microsoft SQL Server 2012 Integration Services
Professional Microsoft SQL Server 2012 Integration Services

THE MOST IMPORTANT BUSINESS intelligence tool in the Microsoft Swiss Army knife of tools is SQL Server Integration Services (SSIS). This is because the other tools would be nothing without the cleansing and movement of data into a presentable format. The product can extract, transform, and load (ETL) data astonishingly fast. A 2010 benchmark...

Operating Systems: Design and Implementation (Second Edition)
Operating Systems: Design and Implementation (Second Edition)

Most books on operating systems deal with theory while ignoring practice. While the usual principles are covered in detail, the book describes a small, but real UNIX-like operating system: MINIX. The book demonstrates how it works while illustrating the principles behind it. Operating Systems: Design and Implementation Second...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Forex for Beginners: A Comprehensive Guide to Profiting from the Global Currency Markets
Forex for Beginners: A Comprehensive Guide to Profiting from the Global Currency Markets

"Backed by a comprehensive list of studies, this book is a brilliant contribution on the connections between exchange rates and economics."

—Francesc Riverola, CEO and Founder of FXstreet.com
 

"Adam Kritzer has been covering the forex market for years as a...
Project Arcade: Build Your Own Arcade Machine
Project Arcade: Build Your Own Arcade Machine
This book is a culmination of five years of research into the subject of interfacing genuine arcade controls to computers. It is a polished and portable companion to the author’s Web site, the Build Your Own Arcade Controls FAQ (BYOAC), located at www.arcadecontrols.com/. Most of the research and information for this book came from the Web,...
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
UML 2 Certification Guide: Fundamental & Intermediate Exams (The MK/OMG Press)
UML 2 Certification Guide: Fundamental & Intermediate Exams (The MK/OMG Press)
UML 2 Certification Guide
Fundamental and Intermediate Exams
Tim Weilkiens
Bernd Oestereich

The authors have proven their mettle by teaching UML expertise in classroom settings that led to remarkably high OCUP test passing rates, just weeks after the UCOP Program became available worldwide.
You have taken the right
...
The Extracted MBA: A Topical Reference for the Contemporary MBA
The Extracted MBA: A Topical Reference for the Contemporary MBA
The Extracted MBA represents the culmination of a decade's worth of undergraduate and graduate study, as well my practical management experiences, both in my work and in the courses I teach. Upon being awarded my MBA in 1998, I searched for a book that could concisely provide a reference, a recap if you will, of what I had learned in my years of...
Professional Scrum Development with Microsoft Visual Studio 2012
Professional Scrum Development with Microsoft Visual Studio 2012
By 2001, the software industry was in trouble—more projects were failing than succeeding.

Customers began demanding contracts with penalties, and increasingly sending work offshore. Some software developers, though, had increasing success with a development process known as
...
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy