Home | Amazing | Today | Tags | Publishers | Years | Search 
Java and XSLT (O'Reilly Java)
Java and XSLT (O'Reilly Java)
Java and Extensible Stylesheet Language Transformations (XSLT) are very different
technologies that complement one another, rather than compete. Java's strengths are portability,
its vast collection of standard libraries, and widespread acceptance by most companies. One
weakness of Java, however, is in its ability to process text.
...
Core Python Programming (Prentice Hall Ptr Core Series)
Core Python Programming (Prentice Hall Ptr Core Series)
Python is an Internet and systems programming language that is soaring in popularity in today's fast-paced software development environment, and no wonder: it's simple (yet robust), object-oriented (yet can be used as a procedural language), extensible, scalable and features an easy to learn syntax that is clear and concise. Python combines the...
Professional Java User Interfaces
Professional Java User Interfaces
This book covers the full development life cycle for professional GUI design in Java, from cost estimation and design to coding and testing.
  • Focuses on building high quality industrial strength software in Java
  • Ready-to-use source code is given throughout the text based on industrial-strength projects undertaken by...
Microsoft Windows Script Host 2.0 Developer's Guide (With CD-ROM)
Microsoft Windows Script Host 2.0 Developer's Guide (With CD-ROM)

This book isn't a complete reference to all scripting-related topics—it's a primer that begins with simple step-by-step instructions. Also, because most power users and system administrators know a bit about batch and macro programming but aren't familiar with object-oriented programming, this book provides an introduction to using objects...

Programming Microsoft   Windows  CE, Second Edition (Pro-Developer )
Programming Microsoft Windows CE, Second Edition (Pro-Developer )
I've been working with Windows CE for almost as long as it's been in existence. A Windows programmer for many years, I'm amazed by the number of different, typically quite small, systems to which I can apply my Windows programming experience. These Windows CE systems run the gamut from PC-like mini-laptops to embedded devices buried deep in some...
MySQL Administrator's Guide
MySQL Administrator's Guide
If you are not already one of the 4 million plus users of the MySQL database, you will want to become one after reading this book. MySQL Administrator's Guide is the official guide to installing, administering and working with MySQL 5.0 and MySQL databases. Starting with the basics, you will learn to store, manage and retrieve data in a MySQL...
Software Craftsmanship: The New Imperative
Software Craftsmanship: The New Imperative

By recognizing that software development is not a mechanical task, you can create better applications.

Today’s software development projects are often based on the traditional software engineering model, which was created to develop large-scale defense projects. Projects that use this antiquated industrial model tend to take...

Real-Time Shader Programming (The Morgan Kaufmann Series in Computer Graphics)
Real-Time Shader Programming (The Morgan Kaufmann Series in Computer Graphics)
An indispensable reference for the game developer, graphics programmer, game artist, or visualization programmer, to create countless real-time 3D effects.

Now that PC users have entered the realm of programmable hardware, graphics programmers can create 3D images and animations comparable to those produced by RenderMan's procedural
...
Maximum Wireless Security
Maximum Wireless Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

Web Security & Commerce (O'Reilly Nutshell)
Web Security & Commerce (O'Reilly Nutshell)
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of
personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?

Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks
...
The UML Profile for Framework Architectures
The UML Profile for Framework Architectures

The UML community has begun to define a series of 'profiles' which better suit the needs of UML-users within specific domains, settings or technologies.

The UML Profile for Framework Architectures provides a UML profile for object and component frameworks. It shows how to describe framework architectures and to support...

Result Page: 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 425 424 423 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy