Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations of Java for ABAP Programmers
Foundations of Java for ABAP Programmers
Java has been a part of developers’ vocabularies since 1995. At first it was thought of as
being a nice, neat little language that could do some amazing things for the Internet. However,
the language soon matured, and it still kept its simple approach. Developers started to realize
the awesome power of a clean uncluttered
...
Laptops and Tablets For Seniors For Dummies
Laptops and Tablets For Seniors For Dummies

Easy-to-understand advice for seniors who want to get started using their laptops and tablets

Laptop and tablet popularity is on the rise among computer buyers, including seniors. For anyone in the over-60 age group who is eager to get started with a laptop or tablet, this is the book for you! Laptops and tablets are ideal...

The Meltdown Years: The Unfolding of the Global Economic Crisis
The Meltdown Years: The Unfolding of the Global Economic Crisis

The Meltdown Years offers the most lucid and useful explanation to date about why home values, life savings, job security, and investments around the world are in peril.

Rather than focus on who is to blame, though, author Wolfgang Münchau takes the more practical approach of focusing on...

The Everyday Internet All-in-One Desk Reference for Dummies
The Everyday Internet All-in-One Desk Reference for Dummies
8 books in 1 -- simplify your life with Internet tools
Your one-stop guide to using online resources, keeping in touch, and having fun!
The Internet is a worldwide workplace, a giant communications network, a vast playground, and there's a minibook here covering each aspect of it. Find out about e-mail, researching on the Web,
...
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
Advanced Database Technology and Design (Artech House Computer Library)
Advanced Database Technology and Design (Artech House Computer Library)
Since computers were introduced to automate organization management,
information system evolution has influenced data management considerably.
Applications demand more and more services from information stored in
computing systems. These new services impose more stringent conditions on
the currently prevailing client/server
...
Collateral Management: A Guide to Mitigating Counterparty Risk (Wiley Finance)
Collateral Management: A Guide to Mitigating Counterparty Risk (Wiley Finance)
Insight into collateral management and its increasing relevance in modern banking

In the wake of recent financial crises, firms of all sizes have adjusted their policies to incorporate more frequent instances of collateral management. Collateral Management: A Guide to Mitigating Counterparty Risk explains the...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Sams Teach Yourself Shell Programming in 24 Hours
Sams Teach Yourself Shell Programming in 24 Hours
The vast majority of users utilize the Korn Shell or some variant of the Bourne Shell, such as bash. Sams Teach Yourself Shell Programming in 24 Hours covers these shells. It begins with a generalized tutorial of Unix and tools and then moves into detailed coverage of shell programming. Sams Teach Yourself Shell Programming in 24...
Linux Kernels Internals (2nd Edition)
Linux Kernels Internals (2nd Edition)

Since the introduction of Linix version 1.2 in March 1995, a worldwide community has evolved from programmers who were attracted by the reliability and flexibility of this completely free operating system. Now at version 2.0, Linux is no longer simply the operating system of choice for hackers, but is being successfully employed in commercial...

Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)

This book offers a clear, concise guide for anyone involved in developing applications, evaluating products, designing systems, managing databases, or engineering products. It provides an understanding of the internals of transaction processing systems, describing how they work and how best to use them. It includes the architecture of...

Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy