 |
|
 The Power of PROC FORMATThe FORMAT procedure in SAS is an extremely useful procedure that is often included in most of my source code. I first started using PROC FORMAT to create formats to be used as a table lookup for grouping data in reports. I then started to use PROC FORMAT to aid data set creation and also to define new variables. I also learned to... |  |  Learn Vertex & Pixel Shader Programming with DirectX 9This book covers all the fundamentals of programming vectors using SIMD methodology in conjunction with the Direct3D 9 application interfaces.
Text shows how to write assembly language for programming the vertex shader and pixel shader hardware using DirectX 9. Covers the fundamentals of programming vectors using SIMD methodology in... |  |  Pro C# 2005 and the .NET 2.0 Platform, Third EditionIremember a time years ago when I proposed a book to Apress regarding a forthcoming software SDK code-named Next Generation Windows Services (NGWS). As you may be aware, NGWS eventually became what we now know as the .NET platform. My research of the C# programming language and the .NET platform took place in parallel with the authoring of the... |
|
 ASP.NET 2.0 All-In-One Desk Reference For Dummies (Computer/Tech)8 books in 1 — your key to ASP.NET 2.0 success!
Your one-stop guide to building dynamic, interactive, HTML-based Web pages
ASP.NET 2.0 can do a lot, so there's a lot to understand. This handy volume replaces a whole shelf of programming books with the essentials you need,... |  |  XQuery: The XML Query LanguageFrom corporate IT departments to academic institutions, XML has become the language of choice for storing and transmitting data across diverse application domains. XQuery, an XML Query Language invented by the World Wide Web Consortium, offers a powerful, standardized way to query all of that XML-encapsulated information. With its ability to... |  |  Building And Integrating Virtual Private Networks With OpenswanWith the widespread use of wireless networking and the integration of VPN capabilities in most modern laptops, PDAs, and even cellular phones, there is a growing desire for encrypting more and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless network? Is your neighbor snooping on your WiFi... |
|
|
|
| Result Page: 445 444 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 |