Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro .NET Memory Management: For Better Code, Performance, and Scalability
Pro .NET Memory Management: For Better Code, Performance, and Scalability
Understand .NET memory management internal workings, pitfalls, and techniques in order to effectively avoid a wide range of performance and scalability problems in your software. Despite automatic memory management in .NET, there are many advantages to be found in understanding how .NET memory works and how you can best write...
Community Pest Management in Practice: A Narrative Approach
Community Pest Management in Practice: A Narrative Approach
This book presents a collection of practitioner and community stories that reveal how invasive species management is a community issue that can spark community formation and collective action. It combines the unique first-person narratives of practitioners on the frontline of invasive species management in Australia with three case studies of...
Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments (Computer Supported Cooperative Work)
Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments (Computer Supported Cooperative Work)

Avatars at Work and Play brings together contributions from leading social scientists and computer scientists who have conducted research on virtual environments used for collaboration and online gaming. They present a well-rounded and state-of-the-art overview of current applications of multi-user virtual environments, ranging...

iOS UICollectionView: The Complete Guide (2nd Edition) (Mobile Programming)
iOS UICollectionView: The Complete Guide (2nd Edition) (Mobile Programming)

Fully updated for iOS 7, iOS UICollectionView: The Complete Guide, Second Edition will help you build highly immersive, cutting-edge iOS user interfaces that transform your apps from good to great! Ash Furrow...

Statistics for Business
Statistics for Business

Statistical analysis is essential to business decision-making and management, but the underlying theory of data collection, organization and analysis is one of the most challenging topics for business students and practitioners. This user-friendly text and CD-ROM package will help you to develop strong skills in presenting and interpreting...

Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)
Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)
This book explains how to build a Virtual Private Network (VPN), a collection of
technologies that creates secure collections or "tunnels" over regular Internet lines. It
discusses costs, configuration, and how to install and use technologies that are available for
Windows NT and UNIX, such as PPTP and L2TP, Altavista
...
Integrity and Internal Control in Information Systems VI
Integrity and Internal Control in Information Systems VI
The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions:
  • what precisely do business managers need...
Transmission Line Design Handbook (Artech House Antennas and Propagation Library)
Transmission Line Design Handbook (Artech House Antennas and Propagation Library)
If your looking for derivations - this is the wrong book for you
There is also a shortage analysis techniques.

This book is packed with quick formula and would might be quite useful as implied by the "design handbook" name. Some of the...

VB.NET Core Classes in a Nutshell
VB.NET Core Classes in a Nutshell
The .NET platform gives Visual Basic developers access to an entirely new and comprehensive class library that promises to further simplify and speed VB application development. In VB.NET Core Classes in a Nutshell, VB Programmers will find a concise and thorough reference to the types found in the core namespaces of the .NET Framework...
Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Ruby Under a Microscope: An Illustrated Guide to Ruby Internals
Ruby Under a Microscope: An Illustrated Guide to Ruby Internals

Ruby is a powerful programming language with a focus on simplicity, but beneath its elegant syntax it performs countless unseen tasks.

Ruby Under a Microscope gives you a hands-on look at Ruby's core, using extensive diagrams and thorough explanations to show you how Ruby is implemented (no C skills
...

Learn Linux in a Month of Lunches
Learn Linux in a Month of Lunches

Summary

Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, like connecting to a network, installing software, and securing your system. Whether you're just curious about Linux or have to get up and running for your job, you'll appreciate...

unlimited object storage image
Result Page: 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy