Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft SQL Server 2005 Integration Services
Microsoft SQL Server 2005 Integration Services

All medium to large companies have to deal with data being stored in a number of databases, spreadsheets and proprietary applications. Bringing all this data together into one system can be useful to analyzing the business; but can also be quite difficult to do. Integration Services is the next...

MEMS Mechanical Sensors
MEMS Mechanical Sensors
    With this practical guide to design tools and packaging, professionals and academics can create the sensors they need for a complete range of next generation applications.

    Here's the book to keep handy when you have to overcome obstacles in design, simulation,
...
Modeling Derivatives in C++
Modeling Derivatives in C++

This book is the definitive and most comprehensive guide to modeling derivatives in C++ today. Providing readers with not only the theory and math behind the models, as well as the fundamental concepts of financial engineering, but also actual robust object-oriented C++ code, this is a practical introduction to the most important derivative...

AJAX: Creating Web Pages with Asynchronous JavaScript and XML (Bruce Perens' Open Source Series)
AJAX: Creating Web Pages with Asynchronous JavaScript and XML (Bruce Perens' Open Source Series)

The Easy, Example-Based Guide to Ajax for Every Web Developer

 

Using Ajax, you can build Web applications with the sophistication and usability of traditional desktop

...

Real World Color Management, Second Edition
Real World Color Management, Second Edition
Every graphics professional worth his or her salt knows the importance of color management. No matter how much thought artist and client put into the color scheme for a given project, all of that work is for naught if you can't get your results to match your expectations. Enter Real World Color Management.

In this industrial-strength,...

Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

.NET Windows Forms Custom Controls
.NET Windows Forms Custom Controls

The intent of this book is to teach .NET developers the skills necessary to create their own leading edge custom controls. The art of creating custom controls has never been truly explored in detail, often the examples provided are trivial and do not begin to explore the requirements need for a commercial quality custom control. This book will...

Agent-Based Hybrid Intelligent Systems
Agent-Based Hybrid Intelligent Systems
Many complex problems, such as financial investment planning, involve many different components or sub-tasks, each of which requires different types of processing. To solve such complex problems, a great diversity of intelligent techniques, including traditional hard computing techniques (e.g., expert systems) and soft computing techniques (e.g.,...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Symbian OS Communications Programming
Symbian OS Communications Programming
Welcome to the updated edition of Symbian OS Communications Programming! In this book we’ll introduce you to much of the major communications functionality in Symbian OS and demonstrate how to perform common tasks in each area.

For this new edition we’ve started from scratch to produce chapters that are relevant to you as
...
The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
unlimited object storage image
Result Page: 969 968 967 966 965 964 963 962 961 960 959 958 957 956 955 954 953 952 951 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy