Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Flex Solutions: Essential Techniques for Flex 2 and 3 Developers
Flex Solutions: Essential Techniques for Flex 2 and 3 Developers
Flex is the quickest and most effective technology for the creation of Rich Internet Applications for the Web. Its extensive library of components and totally customizable framework, combined with the ubiquity of Flash Player, has guaranteed its success.

The ecosystem of products that rotate around Flex 2 and Flex 3 is really broad. Flex...

Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
With the maturing of mobile portable telephony and the emerging broadband access market, greater fiber transmission capacity will be essential in the early 21st century. Since the demand for more capacity drives the development of new optics-based technologies, fiber optics therefore remains a vibrant area for research. Mathematical Principles of...
The Essential Galileo
The Essential Galileo
Edited and translated by Maurice A. Finocchiaro, an international authority on Galileo, this collection makes available to scholars and students an excellent and extensive selection of Galileo's key works from his early career to the end of his life - some in toto and some represented by key selections. It presents not only Galileo's most famous...
Programming Windows Identity Foundation (Dev - Pro)
Programming Windows Identity Foundation (Dev - Pro)

A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)

The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Fundamentals of Database Management Systems
Fundamentals of Database Management Systems
A course in database management has become well established as a required course in both undergraduate and graduate management information systems degree programs. This is as it should be, considering the central position of the database field in the information systems environment. Indeed, a solid understanding of the...
MATLAB Control Systems Engineering
MATLAB Control Systems Engineering

MATLAB is a high-level language and environment for numerical computation, visualization, and programming. Using MATLAB, you can analyze data, develop algorithms, and create models and applications. The language, tools, and built-in math functions enable you to explore multiple approaches and reach a solution faster than with spreadsheets or...

Practical C++ Design: From Programming to Architecture
Practical C++ Design: From Programming to Architecture
Go from competent C++ developer to skilled designer or architect using this book as your C++ design master class. This title will guide you through the design and implementation of a fun, engaging case study. Starting with a quick exploration of the requirements for building the application, you'll delve into selecting an...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Novell NetWare 6.5 Administrator's Handbook
Novell NetWare 6.5 Administrator's Handbook

Novell NetWare 6.5 Administrators Handbook is the Novell-authorized quick reference for NetWare administration covering all of the new features of NetWare 6.5. The release of NetWare 6.5 continues to redefine NetWare as a powerful Web-oriented platform for delivering a consistent, location...

unlimited object storage image
Result Page: 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy