Home | Amazing | Today | Tags | Publishers | Years | Search 
Powerful Proposals: How to Give Your Business the Winning Edge
Powerful Proposals: How to Give Your Business the Winning Edge
How does a company constantly win more business than its rivals? A key factor is the ability to create proposals that outshine those from even the strongest competitors. Powerful Proposals helps businesses maximize the selling power of their proposals, with proven strategies for going beyond "this is what we do" documents in...
Security for Web Services and Service-Oriented Architectures
Security for Web Services and Service-Oriented Architectures

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with...

How to Build a Digital Library, Second Edition
How to Build a Digital Library, Second Edition

How to Build a Digital Library is the only book that offers all the knowledge and tools needed to construct and maintain a digital library, regardless of the size or purpose. It is the perfectly self-contained resource for individuals, agencies, and institutions wishing to put this powerful tool to work in their burgeoning information...

Professional Refactoring in C# & ASP.NET (Wrox Programmer to Programmer)
Professional Refactoring in C# & ASP.NET (Wrox Programmer to Programmer)

Refactoring is an effective way to quickly uncover problematic code and fix it. In this first book to provide a hands-on approach to refactoring in C# and ASP.NET, you'll discover to apply refactoring techniques to manage and modify your code. Plus, you'll learn how to build a prototype application from scratch and discover how to refactor the...

Open Your Eyes: Deaf Studies Talking
Open Your Eyes: Deaf Studies Talking
This book was born out of the Deaf Studies Think Tank, a three-day symposium in the summer of 2002 sponsored by the National Endowment for the Humanities, Gallaudet University’s Provost’s Offi ce, and the Gallaudet Research Institute. The Deaf Studies Think Tank convened twenty scholars to debate, discuss, and explore the issues and...
Apprenticeship Patterns: Guidance for the Aspiring Software Craftsman
Apprenticeship Patterns: Guidance for the Aspiring Software Craftsman

Are you doing all you can to further your career as a software developer? With today's rapidly changing and ever-expanding technologies, being successful requires more than technical expertise. To grow professionally, you also need soft skills and effective learning techniques. Honing those skills is what this book is all about. Authors Dave...

Sas/Graph 9.2 Reference
Sas/Graph 9.2 Reference
The changes and enhancements for SAS/GRAPH 9.2 are very extensive. Highlights include the following:

The new SAS/GRAPH statistical graphics suite provides a new set of procedures, a new language, and a graph editor specifically designed for creating and editing statistical graphics.
All SAS/GRAPH procedures now support ODS styles
...
Principles of Computer System Design: An Introduction
Principles of Computer System Design: An Introduction
To the best of our knowledge this textbook is unique in its scope and approach. It provides a broad and in-depth introduction to the main principles and abstractions for engineering computer systems, be it an operating system, a client/service application, a database system, a secure Web site, or a fault-tolerant disk cluster. These principles and...
Expert VB 2008 Business Objects
Expert VB 2008 Business Objects
I have a passion for frameworks. In more than 20 years as a professional developer, I’ve never worked on a computing platform that did everything I needed it to do to build applications productively. The Microsoft .NET platform is wonderful, but it doesn’t always do quite what I want or need. To address those needs, I’m always...
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

Genetics and Genomics of Cotton (Plant Genetics and Genomics: Crops and Models)
Genetics and Genomics of Cotton (Plant Genetics and Genomics: Crops and Models)

A few members of the Gossypium (cotton) genus are cultivated for the production of elongated single-celled fibers valued worldwide at about $20 billion annually at the farm gate, and which sustain one of the world’s largest industries (textiles) with an annual worldwide economic impact of about $500 billion. In a number of ways, cotton...

Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy