Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IronRuby Unleashed
IronRuby Unleashed

Ruby has built an enormous following of developers attracted by its intuitiveness, flexibility, and simplicity. Meanwhile, Microsoft’s .NET has grown and matured into a platform of unparalleled power. IronRuby brings them together, enabling developers to write elegant, efficient Ruby code that seamlessly...

The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach
The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach

The modern world offers lots of readily available online resources for learning. Wikipedia, Google, news sources, millions of Web sites and blogs, even YouTube, offer access to information in nearly any subject that triggers your curiosity and interest. Nonetheless, I continue to believe that for deep understanding of something, nothing...

PySide GUI Application Development
PySide GUI Application Development

Newbies to GUI programming in Python will find this book indispensable. As well as the basic concepts, you'll be taught PySide in detail through practical instructions and create your own applications with customized widgets and dialogs.

Overview

  • Designed for beginners to help them get started with...
Beginning ARKit for iPhone and iPad: Augmented Reality App Development for iOS
Beginning ARKit for iPhone and iPad: Augmented Reality App Development for iOS

Explore how to use ARKit to create iOS apps and learn the basics of augmented reality while diving into ARKit specific topics. This book reveals how augmented reality allows you to view the screen on an iOS device, aim the camera at a nearby scene, and view both the real items in that scene as well as a graphic image overlaid on to...

The Portal
The Portal
For thousands of years, the question has been asked: How do you get through the turbulence of life?

We are hurtling towards a pivotal moment for humanity, a point in time when what we do next could determine the future of our species. Economic, environmental, technological and humanitarian experts suggest we are
...
Microsoft Office 2003 Step by Step
Microsoft Office 2003 Step by Step

Experience learning made easy—and quickly teach yourself how to use Microsoft Office Access, Excel, FrontPage, InfoPath, OneNote, Outlook, PowerPoint, Publisher, and Word. With Step by Step, you can take just the lessons you need, or work from cover to cover. Either way, you drive the instruction—building and practicing the...

ASP.NET in a Nutshell, Second Edition
ASP.NET in a Nutshell, Second Edition
Newly updated for Visual Studio .NET 2003, the second edition of this book includes fresh information on application and web service development, custom controls, data access, security, deployment, and error handling, new material on web application development for mobile devices, plus an overview of the class libraries.

ASP.NET is the
...
Sams Teach Yourself MySQL in 21 Days
Sams Teach Yourself MySQL in 21 Days
Sams Teach Yourself MySQL in 21 Days teaches you to design and implement your own open source database. Topics include: Designing and Creating your First Database, Normalizing your Data, Adding Tables, Columns, and Indexes, MySQL Data Types, Importing and Exporting Data, Locks and Keys, Building a MyODBC Interface, Building a Perl Interface,...
Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications

Proven techniques and patterns for enterprise development.

  • Design guidelines for EJB 2.0 component architecture
  • Powerful patterns for enterprise application design
  • Extensive real-world code examples
  • Covers every type of component, including message-driven beans

This...

Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network

Make informed decisions about planning and installing 802.11 “Wi-Fi” wireless networks. This book helps you tackle the challenge, whether installing Wi-Fi within an existing corporate network, or setting up a wireless network from scratch in any business or organization. Author Janice Reynolds guides you through everything you need...

unlimited object storage image
Result Page: 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy