Home | Amazing | Today | Tags | Publishers | Years | Search 
Professional Unified Communications Development with Microsoft Lync Server 2010
Professional Unified Communications Development with Microsoft Lync Server 2010

RATHER THAN SIMPLY REPLACING PHONES and instant messages, Microsoft Lync, Microsoft ’ s Unifi ed Communications platform, makes communicating in completely new ways possible. Lync users can see whether a contact is available and where he or she is located before reaching out. After a user has decided to contact someone, he can...

Windows Phone 7 Recipes: A Problem-Solution Approach
Windows Phone 7 Recipes: A Problem-Solution Approach

You have just bought your new Windows Phone 7 device and would like to start developing applications. You need to know the device’s hardware characteristics such as screen resolution and memory capability—but also which sensors and services it provides. Finally, you need to understand what the Windows Phone 7 operating system...

Dependability of Networked Computer-based Systems (Springer Series in Reliability Engineering)
Dependability of Networked Computer-based Systems (Springer Series in Reliability Engineering)

This book is meant for research scholars, scientists and practitioners involved with the application of computer-based systems in critical applications. Ensuring dependability of systems used in critical applications is important due to the impact of their failures on human life, investment and environment. The individual aspects of...

Multidisciplinary Information Retrieval: Second Information Retrieval Facility Conference, IRFC 2011
Multidisciplinary Information Retrieval: Second Information Retrieval Facility Conference, IRFC 2011

IRFC 2011 received 19 high-quality submissions, of which 10 were accepted for presentation at the conference and appear here. Three of these fall into the natural language processing for IR area, one into the distributed computing area, while the remaining six are IR papers.

The IRF Conference provides a multi-disciplinary,...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Windows Azure Step by Step
Windows Azure Step by Step

Windows Azure is the Microsoft cloud computing platform that lets developers leverage its powerful, scalable, and fault-tolerant infrastructure to build successful applications.

Windows Azure Step by Step provides an organized walkthrough of the Windows Azure platform and its related technologies. The text is...

America's Most Wanted Recipes - Volume 2
America's Most Wanted Recipes - Volume 2

Discover the secret recipes for your favorite restaurant dishes and learn how to make them yourself. This cookbook will teach you the jealously guarded secrets behind actual dishes from billion dollar restaurants - The Cheesecake Factory, KFC, The Olive Garden, PF Chang's, Red Lobster, Hard Rock Cafe... (far too many to list here) and...

XAML Developer Reference
XAML Developer Reference
XAML is ubiquitous today. Whether with Silverlight, WPF, WF, various XPS formats, or XML-based formats, XAML is being used in a whole lot of Microsoft platform- based technologies. Though based on XML, XAML is unlike most other markup languages, because it is strongly linked to CLR assemblies through its objects.
 
...
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems

Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions...

SQL and Relational Theory: How to Write Accurate SQL Code
SQL and Relational Theory: How to Write Accurate SQL Code

This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course— using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things, experience gained from teaching live seminars based on the first edition.

One...

Application Theory of Petri Nets: 32nd International Conference, PETRI NETS 2011, Newcastle, UK, June 20-24, 2011
Application Theory of Petri Nets: 32nd International Conference, PETRI NETS 2011, Newcastle, UK, June 20-24, 2011

This volume constitutes the proceedings of the 32nd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2011). The Petri Net conferences serve as annual meeting places to discuss the progress in the field of Petri nets and related models of concurrency. They provide a forum for...

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Result Page: 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy