Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Controlled Genetic Manipulations (Neuromethods, Vol. 65)
Controlled Genetic Manipulations (Neuromethods, Vol. 65)

The current demand for the development of techniques for controlled genetic manipulations is driven by the anatomical and physiological complexity of the brain and by the need for experimental models that can address this complexity through selective manipulation of defined components of the system: specific neuronal populations or selected...

Real-World Hadoop
Real-World Hadoop

If you’re a business team leader, CIO, business analyst, or developer interested in how Apache Hadoop and Apache HBase-related technologies can address problems involving large-scale data in cost-effective ways, this book is for you. Using real-world stories and situations, authors Ted Dunning and Ellen Friedman show Hadoop...

Extreme Programming for Web Projects
Extreme Programming for Web Projects

Web development teams have been operating in the dark for far too long. The lack of proven development methodologies for the Web environment has resulted in a constant struggle for developers to produce quality Web-based projects on time and within budget. The field is multidisciplinary in character, involving both technology and...

Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Professional LINQ (Programmer to Programmer)
Professional LINQ (Programmer to Programmer)
Professional LINQ

Are you ready to revolutionize the way you can work with data? This book shows you how to effectively utilize LINQ so that you can query XML, SQLdatabases, ADO.NET DataSets, and other data sources, and it also delvesdeeper into the technology to demonstrate how LINQ can dramatically improve your...

The Practical Handbook of Internet Computing
The Practical Handbook of Internet Computing
The time is absolutely ripe for this handbookThere is no single source of information that has this breadth todayFinally, there is an examination of the Internet as a holistic system. Topics of privacy, trust, policy, and law are addressed as well as the structure of the Internet and of the Web.
Stuart Feldman, Vice President, Internet
...
Fundamentals of Semiconductor Physics and Devices
Fundamentals of Semiconductor Physics and Devices
People come to technical books with a vast array of daerent needs and requirements, arising from their differing educational backgrounds, professional orientations and career objectives. This is particularly evident in the field of semiconductors, which stands at the juncture of physics, chemistry, electronic engineering, material science and...
Programming Microsoft LINQ in Microsoft .NET Framework 4
Programming Microsoft LINQ in Microsoft .NET Framework 4

We saw Language Integrated Query (LINQ) for the first time in September 2005, when the LINQ Project was announced during the Professional Developers Conference (PDC 2005). We immediately realized the importance and the implications of LINQ for the long term. At the same time, we felt it would be a huge error to look to LINQ only for its...

Programming Applications for Microsoft Office Outlook 2007
Programming Applications for Microsoft Office Outlook 2007

Microsoft Office Outlook 2007 offers compelling new product features including Instant Search, task flagging, the To-Do Bar, Calendar overlays, sharing with friends and coworkers, Really Simple Syndication (RSS) feeds, Electronic Business Cards, Microsoft Office SharePoint Server integration, and plenty of other features that make Outlook...

Developing C# Apps for iPhone and iPad using MonoTouch: iOS Apps Development for .NET Developers
Developing C# Apps for iPhone and iPad using MonoTouch: iOS Apps Development for .NET Developers

Developing C# Applications for iPhone and iPad using MonoTouch shows you how to use your existing C# skills to write apps for the iPhone and iPad. Fortunately, there's MonoTouch, Novell's .NET library that allows C# developers to write C# code that executes in iOS. Furthermore, MonoTouch allows you to address all the unique...

How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

unlimited object storage image
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy