Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Microsoft Analysis Services 2005: And Microsoft Business Intelligence Platform
Applied Microsoft Analysis Services 2005: And Microsoft Business Intelligence Platform
Knowledge is power! As its name suggests, the promise of Microsoft SQL Server Analysis Services 2005 is to promote better data analytics by giving information workers the right tool to analyze consistent, timely, and reliable data. Empowered with Analysis Services and Microsoft Business Intelligence Platform, you are well positioned to solve the...
Open Source Systems Security Certification
Open Source Systems Security Certification
Open Source Advances in Computer Applications book series provides timely technological and business information for:

Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies;

Inserting OSS in the critical path of complex network development and embedded...

Modelling Stochastic Fibrous Materials with Mathematica® (Engineering Materials and Processes)
Modelling Stochastic Fibrous Materials with Mathematica® (Engineering Materials and Processes)
Recent developments in the use of electrospun fibrous materials, for application as scaffolds for tissue engineering and in the application of carbon fibrous materials in fuel cells, has generated new interest in the dependence of the properties and structure of these materials on those of their constituent fibres. Modelling Stochastic Fibrous...
Python for Unix and Linux System Administration
Python for Unix and Linux System Administration
Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them.

Each chapter in Python for Unix and
...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Object Oriented Programming in Eiffel
Object Oriented Programming in Eiffel
Provides a clear introduction to the Eiffel programming language. Covers the language, logical assertions, and design of object-oriented systems, making it ideal for a new programmer or those unfamiliar with object-oriented programming. Paper. DLC: Object-oriented prog.

The book is an introductory text on Eiffel for the new
...
TCP/IP Professional Reference Guide
TCP/IP Professional Reference Guide
The TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP...
Common Design Patterns for Symbian OS: The Foundations of Smartphone Software (Symbian Press)
Common Design Patterns for Symbian OS: The Foundations of Smartphone Software (Symbian Press)
Common Design Patterns for Symbian OS is the first design patterns book that addresses Symbian OS specifically. It introduces programmers to the common design patterns that help implement a large variety of applications and services on Symbian OS. The goal of the book is to provide the experience of Symbian's developers to a wider audience...
Real-Time Systems: Formal Specification and Automatic Verification
Real-Time Systems: Formal Specification and Automatic Verification
Real-time systems need to react to certain input stimuli within given time bounds. For example, an airbag in a car has to unfold within 300 milliseconds in a crash. There are many embedded safety-critical applications and each requires real-time specification techniques. This text introduces three of these techniques, based on logic and automata:...
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

Result Page: 516 515 514 513 512 511 510 509 508 507 506 505 504 503 502 501 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy