Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshooting Microsoft Technologies: The Ultimate Administrator's Repair Manual (The Addison-Wesley Microsoft Technology Series)
Troubleshooting Microsoft Technologies: The Ultimate Administrator's Repair Manual (The Addison-Wesley Microsoft Technology Series)
Many IT professionals have long considered the practice of troubleshooting to be more of an art than a science. However, with the right methodology, anyone can systematically analyze and repair problems affecting an individual computer or an entire network. All it requires is an understanding of the technologies involved, knowledge of the available...
Proven Portals: Best Practices for Planning, Designing, and Developing Enterprise Portals (Addison-Wesley Information Technology Series)
Proven Portals: Best Practices for Planning, Designing, and Developing Enterprise Portals (Addison-Wesley Information Technology Series)
If you need to plan, design, or deploy an enterprise portal this book is for you. Initiating a portal project (or rescuing one under way) is an exciting, sometimes daunting, challenge. Fortunately, the craft of portal design is now mature enough to identify the best practices that lead to successful implementations. Examples of those...
Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

Mac OS X Leopard Phrasebook (Developer's Library)
Mac OS X Leopard Phrasebook (Developer's Library)
When then-Apple-CEO Gil Amelio announced in 1997 that the company had bought NeXT and that Steve Jobs, Apple's erstwhile founder and visionary, would be returning, many die-hard Macintosh fans were horrified. Apple was not in good shape at the time, and the purchase of NeXT almost certainly meant that the beloved but creaky old Mac OS would be...
GPU Gems 3
GPU Gems 3
It has been only three years since the first GPU Gems book was introduced, and some areas of real-time graphics have truly become ultrarealistic. Chapter 14, "Advanced Techniques for Realistic Real-Time Skin Rendering," illustrates this evolution beautifully, describing a skin...
OpenGL(R) Programming Guide: The Official Guide to Learning OpenGL(R), Version 2.1 (6th Edition)
OpenGL(R) Programming Guide: The Official Guide to Learning OpenGL(R), Version 2.1 (6th Edition)

OpenGL® Programming Guide, Sixth Edition

OpenGL is a powerful software interface used to produce high-quality, computergenerated images and interactive applications using 2D and 3D objects, bitmaps, and color images.

The OpenGL® Programming Guide, Sixth...

Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

OpenGL(R) Programming on Mac OS(R) X: Architecture, Performance, and Integration
OpenGL(R) Programming on Mac OS(R) X: Architecture, Performance, and Integration
The Mac has fully embraced OpenGL throughout its visual systems. In fact, Apple's highly efficient, modern OpenGL implementation makes Mac OS X one of today's best platforms for OpenGL development. OpenGL® Programming on Mac OS® X is the first comprehensive resource for every graphics...
The New School of Information Security
The New School of Information Security
“It is about time that a book like The New School came along. The age of security as pure technology is long past, and modern practitioners need to understand the social and cognitive aspects of security if they are to be successful. Shostack and Stewart teach readers exactly what they need to know--I just wish I could...
Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities
Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities
Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpaceis the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals

Drawing on
...
Essential Windows Communication Foundation (WCF): For .NET Framework 3.5 (Microsoft .NET Development Series)
Essential Windows Communication Foundation (WCF): For .NET Framework 3.5 (Microsoft .NET Development Series)
“Whether this is the first time or the fifty-first time you’re using WCF, you’ll learn something new by reading this book.”

 --Nicholas Allen, Program Manager, Web Services, Microsoft

 

Windows Communication Foundation (WCF) is the...

unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy