Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IBM e Server Certification Study Guide-AIX 5L Communications
IBM e Server Certification Study Guide-AIX 5L Communications
The AIX and IBM eServer pSeries Certifications, offered through the Professional Certification Program from IBM, are designed to validate the skills required of technical professionals who work in the powerful and often complex environments of AIX and IBM eServer pSeries. A complete set of professional certifications are available. They include:...
Pragmatic Unit Testing in C# with NUnit (Pragmatic Programmers)
Pragmatic Unit Testing in C# with NUnit (Pragmatic Programmers)
Learn how to improve your C# coding skills using unit testing. Despite it's name, unit testing is really a coding technique, not a testing technique. Unit testing is done by programmers, for programmers. It's primarily for our benefit: we get improved confidence in our code, better ability to make deadlines, less time spent in the debugger, and...
Stored Procedures, Triggers And User Defined Functions on DB2 Universal Database for Iseries (IBM Redbooks)
Stored Procedures, Triggers And User Defined Functions on DB2 Universal Database for Iseries (IBM Redbooks)

Stored procedures, triggers and User Defined Functions are the key database features for developing robust and distributed applications. In V5R1, SQL Triggers are supported on DB2 Universal Database for iSeries to give much more portability to the database.

This IBM Redbook includes the latest announced features in V5R1 and V5R2 on...

Investment Risk Management (The Wiley Finance Series)
Investment Risk Management (The Wiley Finance Series)
Risk has two sides: underestimating it harms the investor, while overestimating it prevents the implementation of bold business projects. This book explains, from the point of view of the practitioner, the analysis of investment risk - a proper account of adequate risk management strategies - and offers an objective and readable account of the most...
Effective Enterprise Java
Effective Enterprise Java

If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to:

  • Use in-process or local storage to avoid the network

    ...
Succeeding with Open Source
Succeeding with Open Source
Much like Odysseus—who had to negotiate perils between Scylla and Charybdis—IT managers face daunting challenges. On one side, there is relentless pressure to cut costs. On the other lies an unending demand for innovative solutions. However, unlike Odysseus, IT managers must not simply avoid either fate: Instead, they must fulfill both...
ACT! 2005 For Dummies
ACT! 2005 For Dummies
Catch this new ACT! and build better relationships

Organize customer information, schedule activities, create reports, and more

It’s time to ACT! on your intention to improve customer relationship management! ACT! 2005 offers great new tools, and with this book in hand, you have a top expert showing you how to use them....

Sensor Technology Handbook
Sensor Technology Handbook
The first decade of the 21st century has been labeled by some as the “Sensor Decade.”
With a dramatic increase in sensor R&D and applications over the past 15 years, sensors
are certainly poised on the brink of a revolution similar to that experienced in
microcomputers in the 1980s. Just in automobiles alone, sensing
...
Undue Influence: How the Wall Street Elite Puts the Financial System at Risk
Undue Influence: How the Wall Street Elite Puts the Financial System at Risk
In late 1999, a Republican congressman held a party in Washington
to celebrate the passing of new legislation destined to
have a profound effect on Wall Street and the entire financial
industry in the United States. Despite the date on the law,
the principle upon which it was based actually had been a cornerstone
of the
...
Maximum Influence: The 12 Universal Laws of Power Persuasion
Maximum Influence: The 12 Universal Laws of Power Persuasion

Do you realize how much your professional success, your personal relationships, your leadership potential, and your income depend on your ability to persuade, influence, and motivate other people? Whatever you want to achieve, Maximum Influence will help make it happen. Persuasion expert Kurt Mortensen has combined years of scientific...

Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobility is perhaps the most important market and technological trend
within information and communication technology. With the advent of new
mobile infrastructures providing higher bandwidth and constant connection
to the network from virtually everywhere, the way people use information
resources is predicted to be radically
...
User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
unlimited object storage image
Result Page: Previous 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy