Home | Amazing | Today | Tags | Publishers | Years | Search 
Defensive Database Programming with SQL Server
Defensive Database Programming with SQL Server

Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as...

Real World Functional Programming: With Examples in F# and C#
Real World Functional Programming: With Examples in F# and C#

Functional programming languages like F#, Erlang, and Scala are attracting attention as an efficient way to handle the new requirements for programming multi-processor and high-availability applications. Microsoft's new F# is a true functional language and C# uses functional language features for LINQ and other recent...

The Red Gate Guide to SQL Server Team-based Development
The Red Gate Guide to SQL Server Team-based Development

Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.

In some cases, this will mean some developers and one or two DBAs,...

Fundamentals of OOP and Data Structures in Java
Fundamentals of OOP and Data Structures in Java

This is a CS 2 book that presents classical data structures in an object-oriented programming (OOP) context using Java. This book also focuses on the basic principles of OOP and graphical user interface (GUI)-based programming – two paradigms essential for modern programming and problem solving. Our book is aimed principally at CS 2...

Your Digital Afterlife: When Facebook, Flickr and Twitter Are Your Estate, What's Your Legacy? (Voices That Matter)
Your Digital Afterlife: When Facebook, Flickr and Twitter Are Your Estate, What's Your Legacy? (Voices That Matter)

Almost without realizing it, we have shifted toward an all-digital culture. Future heirlooms like family photos, home movies, and personal letters now exist only in digital form, and in many cases they are stored using popular services like Flickr, YouTube, and Gmail. These digital possessions form a rich collection that chronicles our lives...

Visual Data Mining: Techniques and Tools for Data Visualization and Mining
Visual Data Mining: Techniques and Tools for Data Visualization and Mining

Business intelligence solutions transform business data into conclusive, fact-based, and actionable information and enable businesses to spot customer trends, create customer loyalty, enhance supplier relationships, reduce financial risk, and uncover new sales opportunities. The goal of business intelligence is to make sense of change-to...

Change Management for Semantic Web Services
Change Management for Semantic Web Services

Software automates a wide variety of business processes in modern enterprises. Changes made to software are, in effect, changes made to the business processes themselves that govern and automate the internal and external operations of an organization.Without a proper disciplined approach to change management, enterprises lack a full...

Building the Mobile Internet (Networking Technology)
Building the Mobile Internet (Networking Technology)

The complete guide to technologies and protocols for delivering seamless mobile Internet experiences

 

In Building the MobileInternet, three leading mobility architects and implementers from Cisco present complete foundational knowledge about...

PayPal APIs: Up and Running: A Developer's Guide
PayPal APIs: Up and Running: A Developer's Guide

Virtually every application delivery model is experiencing a surging demand for transaction convenience. In this book, I introduce PayPal APIs, along with instructions and resources for their integration in different environments, including websites and mobile applications.

The goal of this book is to help you understand...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Flash Game Development by Example
Flash Game Development by Example

With the Flash games market in continuous expansion, it's no surprise more and more developers are putting their efforts into the creation of Flash games. Anyway, what makes Flash games development different from other kinds of casual game development is the budget required to make it a commercial success.

There are a lot of...

Result Page: 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy