Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Small Business Server 2011 Administrator's Companion
Windows Small Business Server 2011 Administrator's Companion

If you run a small business, you don’t need us to tell you that the highly competitive marketplace, unpredictable economic cycles, time pressures, and technological demands are constantly exerting pressure on your bottom line.

Your business needs the same technologies that large companies do. You need the...

Microsoft SQL Server 2008 R2 Administration Cookbook
Microsoft SQL Server 2008 R2 Administration Cookbook

Most books about SQL Server take one of the two approaches. The first approach is to provide a broad introduction to SQL Server administration. While overviews are great for beginners, they don't provide enough information, leaving the reader wanting for details and practical advice. The second approach is to attempt to cover every...

SilverStripe 2.4 Module Extension, Themes, and Widgets: Beginner's Guide
SilverStripe 2.4 Module Extension, Themes, and Widgets: Beginner's Guide

SilverStripe CMS is an open source web content management system used by governments, businesses, and non-profit organizations around the world. It is a powerful tool for professional web development teams, and web content authors rave about how easy it is to use.

This book is a beginner-friendly introduction to SilverStripe and...

Microsoft Project 2010 Inside Out
Microsoft Project 2010 Inside Out

Welcome to Microsoft Project 2010 Inside Out. This book is your comprehensive Project 2010 reference, in which you can learn not only the essentials, but also the intermediate topics and advanced techniques for using Project 2010 like a power user.

Conquer Microsoft Project 2010—from the inside out!

...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Natural language communication with computers (Lecture notes in computer science)
Natural language communication with computers (Lecture notes in computer science)

In recent years in numerous countries, attempts have been made to   develop natural language systems of communication with computers.

This research has been initiated by well-known research institutes sponsored often by government research programs.

This publication should facilitate an exchange of information,...

Bionanotechnology: Lessons from Nature
Bionanotechnology: Lessons from Nature

Today is the most exciting time to be working in nanotechnology, and bionanotechnology in particular. Chemistry, biology, and physics have revealed an immense amount of information on molecular structure and function, and now we are poised to make use of it for atomic-level engineering. New discoveries are being made every day, and...

Business Process Management Workshops: BPM 2010 International Workshops and Education Track
Business Process Management Workshops: BPM 2010 International Workshops and Education Track

Business process management (BPM) is an established research domain for computer science, information systems, and management scholars. The record number and wide scope of submissions to the eighth installation of the International Conference on Business Process Management was an indication of the vibrancy of the area and the varied...

Agile Business Rule Development: Process, Architecture, and JRules Examples
Agile Business Rule Development: Process, Architecture, and JRules Examples

According to Wordnet, a rule is “a principle or condition that customarily governs behavior” or “a prescribed guide for conduct or action.” Businesses, and organizations in general, operate under a number of rules: rules about what services to offer and to whom; rules about how much to charge for those services;...

Specification by Example: How Successful Teams Deliver the Right Software
Specification by Example: How Successful Teams Deliver the Right Software

The book you hold in your hands, or see on your screen, is the result of a series of studies of how teams all over the world specify, develop, and deliver the right software, without defects, in very short cycles. It presents the collective knowledge of about 50 projects, ranging from public websites to internal back-office systems....

Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development
Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development

With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in fact, turned...

Result Page: 1972 1971 1970 1969 1968 1967 1966 1965 1964 1963 1962 1961 1960 1959 1958 1957 1956 1955 1954 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy