|
|
|
|
| | Microsoft SQL Server 2008 Reporting Services Unleashed
The authoritative, example-rich guide to Microsoft’s powerful reporting platform
With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL... | | GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
The fourth edition of the International Conference on Geospatial Semantics
(GeoS 2011) was held in Brest, France, during May 12–13, 2011.
Geospatial semantics (GEOS) is an emerging research area in the domain of
geographic information science. It aims at exploring strategies, computational
methods, and tools to support... |
|
| | Nuendo Power!Whether you are a musician, recording engineer, sound designer, video editor, or other type of media author, certainly you have noticed that the demands of audio production in today’s multimedia environment have increased dramatically. With the proliferation of surround sound systems in theaters, homes, and specialized... | | |
|
Professional haXe and NekoProfessional haXe and Neko
haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the... | | Professional Microsoft SharePoint 2007 Workflow ProgrammingMicrosoft Windows SharePoint Services (WSS) 3.0 and Microsoft Office SharePoint Server (MOSS) 2007 provide you with a rich framework for collaborative applications. Packed with practical, real-world examples, this book offers you clear instructions for implementing workflow, custom activities, and conditions into SharePoint applications.... | | Secure Coding in C and C++
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append... |
|
|
|
Result Page: 140 139 138 137 136 135 134 133 132 131 130 |