Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
A Developer's Guide to Data Modeling for SQL Server: Covering SQL Server 2005 and 2008
Model SQL Server Databases That Work Better, Do More, and Evolve More Smoothly

Effective data modeling is essential to ensuring that your databases will perform well, scale well, and evolve to meet changing requirements. However, if you’re modeling databases to run on Microsoft SQL Server 2008 or 2005, theoretical
...
TOAD Handbook (2nd Edition)
TOAD Handbook (2nd Edition)

TOAD Handbook is a guide for developing Oracle applications and administering Oracle databases with TOAD. Starting with installation and configuration, the book covers the TOAD SQL editors in depth, including dozens of helpful, undocumented features. Later chapters discuss reporting and exporting data and using several add-on tools designed to...

Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
Catastrophe Disentanglement : Getting Software Projects Back on Track
Catastrophe Disentanglement : Getting Software Projects Back on Track

“There are many books available on software risks and software failures. There are very few books that provide step-by-step information on getting troubled software projects back on track. This book provides detailed guidelines for software project recovery. Some of the steps the author recommends may be unpleasant,...

Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
    The purpose of this book is to illustrate the applicability of Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security technologies in building a secure enterprise infrastructure containing Java-based enterprise applications. With a pragmatic approach, the book explains why Java security...
Graphics Programming with GDI+
Graphics Programming with GDI+

Graphics Programming with GDI+ explores and exploits a wonderful range of GDI+ programming concepts, techniques, and applications for programmers of beginner to intermediate abilities. Being a prolific contributor to the Internet community of developers, Mahesh Chand is offering what seems to be a natural extension of what he...

Hacker's Delight
Hacker's Delight

This is a collection of small programming tricks that I have come across over many years. Most of them will work only on computers that represent integers in two's-complement form. Although a 32-bit machine is assumed when the register length is relevant, most of the tricks are easily adapted to machines with other register...

The Complete Guide to Windows Server 2008 (Addison-Wesley Microsoft Technology Series)
The Complete Guide to Windows Server 2008 (Addison-Wesley Microsoft Technology Series)
“This book is an invaluable one-stop reference for deploying, configuring, and managing Windows Server 2008. It’s filled with John’s unique and hard-earned nuggets of advice, helpful scripts, and shortcuts that will save you time and money.”

--Mark Russinovich

 

...
Modern C++ Design: Generic Programming and Design Patterns Applied
Modern C++ Design: Generic Programming and Design Patterns Applied

Modern C++ Design is an important book. Fundamentally, it demonstrates 'generic patterns' or 'pattern templates' as a powerful new way of creating extensible designs in C++--a new way to combine templates and patterns that you may never have dreamt was possible, but is. If your work involves...

Routing and Switching: time of convergence
Routing and Switching: time of convergence

This book has been written in precise and technical language with the intention of eliminating marketing hype and other inappropriate descriptions. (Indeed the book is no light read as the topics covered are taken most seriously by myself.) The terminology used is derived from standard use (i.e. internationally approved through the...

Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)
Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)

“If you’re writing a native Win32 program or just want to know what the OS is really doing underneath, you need John’s book. He covers the stuff that real systems programmers absolutely must know. Recommended.”

–Chris Sells, Microsoft Corporation

...
Exploiting Online Games: Cheating Massively Distributed Systems
Exploiting Online Games: Cheating Massively Distributed Systems

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...

Result Page: 81 80 79 78 77 76 75 74 73 72 71 70 69 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy