Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced C# Programming
Advanced C# Programming

Your Definitive Professional Resource

Build solutions for the Microsoft .NET platform quickly and easily with C#--an efficient, object-oriented language. Advanced C# Programming thoroughly explains real-world solutions you can apply to a wide range of business applications or to programming problems. This book also reviews...

Solaris 9 System Administrator Exam Cram 2 (Exam Cram 310-014, Exam Cram 310-015)
Solaris 9 System Administrator Exam Cram 2 (Exam Cram 310-014, Exam Cram 310-015)

The perfect study companion for UNIX system professionals preparing for both Solaris 9 System Administrator exams (CX-310-014 and CX-310-015)! The book contains accurate and efficient coverage of the many new features of the Solaris 9 system. This book is not intended to teach new material. Instead it assumes that you have a solid foundation of...

Embedded Systems Firmware Demystified (With CD-ROM)
Embedded Systems Firmware Demystified (With CD-ROM)

Build embedded microprocessor-based systems from the ground up. Develop an integrated understanding of hardware and software issues by exploring the interaction of the firmware and hardware during the first critical few seconds after the microprocessor is powered up. By focusing on these crucial junctures, where software meets hardware, you...

The Lucent Library of Science and Technology - Energy Alternatives
The Lucent Library of Science and Technology - Energy Alternatives
Energy drives all life and is a key component to how humanity works, lives, and sustains itself. Due to the depletion of existing energy sources and the damage being done to the earth's ecosystems, renewable, non-polluting energy sources such as solar, wind, and geothermal power, are being developed and implemented.

The twentieth-century
...
Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business
Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business

Is your business prepared for the world of ANYWHERE?

“Companies are beginning to conceive, design, develop, and distribute products and services in profoundly new ways…But how to exploit this new connectivity? Read on.”
—From the Foreword by Don Tapscott, bestselling author of Grown Up
...

CCNA Wireless Official Exam Certification Guide  (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide
  • Master IUWNE 640-721 exam topics with the official study guide
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with Exam Preparation Tasks
  • Practice with realistic exam questions on the CD-ROM
...
Dr. Tom Shinder's ISA Server 2006 Migration Guide
Dr. Tom Shinder's ISA Server 2006 Migration Guide
Dr. Tom Shinders ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features...
PBX Systems for IP Telephony
PBX Systems for IP Telephony
The most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates...
Configuring ISA Server 2000
Configuring ISA Server 2000
Today's tools for connectivity are more sophisticated and flexible than ever. As a result, there are more variables involved in setting them up and making them all work together. Mission Critical ISA Server 2000 is designed to provide practical guidance to administrators at businesses that are going online. It teaches readers how to use the...
Going Green (Hot Topics)
Going Green (Hot Topics)
Young people today are bombarded with information. Aside from traditional sources such as newspapers, television, and the radio, they are inundated with a nearly continuous stream of data from electronic media. They send and receive e-mails and instant messages, read and write online “blogs,” participate in chat rooms and forums, and...
The Practice of Programming
The Practice of Programming

With the same insight and authority that made their book The Unix Programming Environment a classic, Brian Kernighan and Rob Pike have written The Practice of Programming to help make individual programmers more effective and productive.

The practice of programming...

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy