Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OpenOffice.Org 1.0 Resource Kit
OpenOffice.Org 1.0 Resource Kit
Learn the key features of each application, plus procedures on customizing OpenOffice.org to make using it simple and productive

Comprehensive coverage of each application:

  • Writer—Editing, formatting, mail merge, printing to postscript and PDF, long documents, version control, and comparing documents
  • ...
Operating Systems Design and Implementation (3rd Edition) (Prentice Hall Software Series)
Operating Systems Design and Implementation (3rd Edition) (Prentice Hall Software Series)
The definitive, up-to-date introduction to operating systems:

Core principles plus hands-on examples with the new MINIX 3 operating system

 

The...

Network Management, MIBs and MPLS: Principles, Design and Implementation
Network Management, MIBs and MPLS: Principles, Design and Implementation
Network Management, MIBs and MPLS: Principles, Design and Implementation is the definitive guide to managing and troubleshooting enterprise and service provider networks. This in-depth tutorial from networking expert Stephen Morris delivers clear and concise instruction on networking with MIBs, SNMP, MPLS, and...
Writing bug-free C code for Windows: a programming style that automatically detects bugs in C code
Writing bug-free C code for Windows: a programming style that automatically detects bugs in C code
This book describes an alternate class methodology that provides complete data hiding and fault-tolerant run-time type checking of objects in C programs. With it, you will produce code that contains fewer bugs.

The class methodology helps to prevent bugs by making it easier to write C code. It does this by eliminating data
...
RFID Sourcebook
RFID Sourcebook

The realistic, no-hype guide to RFID evaluation, planning, and deployment

Approaching crucial decisions about Radio Frequency Identification (RFID) technology? This book will help you make choices that maximize the business value of RFID technology and minimize its...

Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process (2nd Edition)
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process (2nd Edition)
“People often ask me which is the best book to introduce them to the world of OO design. Ever since I came across it, ‘Applying UML and Patterns’ has been my unreserved choice.” —Martin Fowler, author, “UML Distilled” and “Refactoring”

The first edition of “Applying UML and Patterns:...

Core JSTL: Mastering the JSP™ Standard Tag Library
Core JSTL: Mastering the JSP™ Standard Tag Library

Using JSTL, software developers and Web page authors can create robust, flexible Web applications more quickly and easily than ever before. Now, best-selling author and JSTL expert David Geary presents the definitive guide to JSTL: its built-in tags, powerful expression language, and extensibility. Through practical examples...

UNIX® Shells by Example, Third Edition
UNIX® Shells by Example, Third Edition

Five UNIX shells, three essential utilities, one indispensable resource!

  • Learn UNIX shell programming the easy way, using hands-on examples

  • Covers all five leading UNIX shells-C, Bourne, Korn, bash, and tcsh

  • ...
Linux Debugging and Performance Tuning : Tips and Techniques
Linux Debugging and Performance Tuning : Tips and Techniques

This is the definitive guide to Linux software debugging and performance optimization at both the kernel and application levels. Using extensive Linux code examples, Steve Best systematically introduces open source tools and best-practice techniques for delivering bug-free, well-tuned code.

Drawing on...

How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions...
DHTML and JavaScript
DHTML and JavaScript
DHTML & JavaScript offers plenty of instruction on using DHTML features as implemented in Netscape's Navigator 4+ browsers. This book contains a wealth of information about style sheets and other elements of Dynamic HTML; however, readers should be forewarned that there is no mention of Microsoft Internet Explorer compatibility...
The Practical Guide to Enterprise Architecture
The Practical Guide to Enterprise Architecture
In A Practical Guide to Enterprise Architecture, six leading experts present indispensable technical, process, and business insight into every aspect of enterprise architecture. You’ll find start-to-finish guidance for architecting effective system, software, and service-oriented architectures; using...
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy