Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Data Driven Web Applications with ASP.NET
Programming Data Driven Web Applications with ASP.NET
Programming Data-Driven Web Applications with ASP.NET provides readers with a solid understanding of ASP.NET and how to effectively integrate databases with their Web sites. The key to making information instantly available on the Web is integrating the Web site and the database to work as one piece. The authors teach this using ASP.NET,...
C# and the .Net Framework: The C++ Perspective
C# and the .Net Framework: The C++ Perspective
This book covers topics ranging from the general principles of .NET through the C# language and how its used in ASP.NET and Windows Forms. Written by programmers for programmers, the content of the book is intended to get readers over the hump of the .NET learning curve and provide solid practical knowledge that will make developers productive from...
Transact-SQL Desk Reference: For Microsoft SQL Server
Transact-SQL Desk Reference: For Microsoft SQL Server

This is the SQL reference you'll reach for first, every time!

If you're an SQL programmer, you can easily picture how useful a comprehensive, single-volume Transact-SQL command reference manual would be in streamlining your work. And if that book was rich in examples, was written with users of all levels of expertise in mind, and was...

Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
THWART THE LATEST DISASTROUS ATTACKS

Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the...

Dynamic Html in Action
Dynamic Html in Action

This is the second edition of Dynamic HTML in Action. We conceived the idea for the first edition of this book when we were developing computer applications with early beta versions of Microsoft Internet Explorer 4. At the time, we knew of no resource that demonstrated how the various emerging technologies for the World Wide Web could...

The Java Tutorial: A Short Course on the Basics, 4th Edition (The Java Series)
The Java Tutorial: A Short Course on the Basics, 4th Edition (The Java Series)

A hands-on guide to the Java programming language, The Java™ Tutorial, Fourth Edition is perfect for any developer looking for a proven path to proficiency with Java SE. This popular tutorial "from the Source" has been completely revised and...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Mac OS X Advanced Development Techniques
Mac OS X Advanced Development Techniques

Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.

The book concentrates on teaching Cocoa development first, and then takes that knowledge and...

Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

Digital Design (3rd Edition)
Digital Design (3rd Edition)
Digital design is concerned with the design of digital electronic circuits. Digital circuits are employed in the design and construction of systems such as digital computers, data communication, digital recording, and many other applications that require digital hardware. This book presents the basic tools for the design of digital circuits and...
The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to...

Result Page: 447 446 445 444 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy