Home | Amazing | Today | Tags | Publishers | Years | Search 
Database Programming with Visual Basic .NET and ADO.NET: Tips, Tutorials, and Code (Waite Group)
Database Programming with Visual Basic .NET and ADO.NET: Tips, Tutorials, and Code (Waite Group)
The topic combination of VB .NET and ADO.NET is unbeatable. VB .NET is the most popular language in which to code. And, every developer needs to understand ADO.NET to allow data to be accessed from a Web site. In this book Developers will be shown numerouse code examples that will illustr4ate how to program database driven applications within...
Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Cam Design Handbook: Dynamics and Accuracy
Cam Design Handbook: Dynamics and Accuracy
Packed with hundreds of detailed illustrations! THE DEFINITIVE GUIDE TO CAM TECHNOLOGY!

The transformation of a simple motion, such as rotation, into linear or other motion is accomplished by means of a cam -- two moving elements mounted on a fixed frame. Cam devices are versatile -- almost any specified motion can be...

R Graphics (Computer Science and Data Analysis)
R Graphics (Computer Science and Data Analysis)

R is revolutionizing the world of statistical computing. Powerful, flexible, and best of all free, R is now the program of choice for tens of thousands of statisticians. Destined to become an instant classic, R Graphics presents the first complete, authoritative exposition on the R graphical system. Paul Murrell, widely known as the leading...

Selling IT Training
Selling IT Training
Selling is a skill. Selling in the ever-changing world of IT training is an art. Martin Bean is a uniquely gifted master of this art form. Now he shares his wisdom, his experience, and his insider’s perspective on the challenges and the opportunities of the IT training marketplace. Learn how you can develop the skills and strengths that will...
Flowgraph Models for Multistate Time-to-Event Data (Wiley Series in Probability and Statistics)
Flowgraph Models for Multistate Time-to-Event Data (Wiley Series in Probability and Statistics)
The main purpose of this book is to present an introduction to flowgraph models for time-to-event data. The focus is on stochastic models for censored time-to-event  data with competing risks and recurrent events. The applications are geared to survivalanalysis and reliability. I view flowgraph models as providing a methodology for data...
Histology Image Review CD-ROM
Histology Image Review CD-ROM
Histology is an image intensive subject. However, this should not necessitate students’ memorization of illustrated material and associated questions. Histology requires an organized approach to the recognition of the microscopic anatomy of tissues and a strong knowledge base concerning the structure and function of those...
Principles of the Spin Model Checker
Principles of the Spin Model Checker
Principles of Spin is an introductory book, the only requirement is a background in programming. Spin models are written in the Promela language which is easily learned by students and programmers. Spin is easy to install and use.

The Spin model checker is not only a widely used professional tool but it is also a superb tool for teaching...

OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
Fractal Geometry: Mathematical Foundations and Applications
Fractal Geometry: Mathematical Foundations and Applications
An accessible introduction to fractals, useful as a text or reference. Part I is concerned with the general theory of fractals and their geometry, covering dimensions and their methods of calculation, plus the local form of fractals and their projections and intersections. Part II contains examples of fractals drawn from a wide variety of areas in...
Communicating Knowledge: Publishing in the 21st Century (Topics in Library and Information Studies)
Communicating Knowledge: Publishing in the 21st Century (Topics in Library and Information Studies)
At the beginning of the twenty-first century, systems of communication are undergoing profound change. Some analysts see this change as revolutionary, comparable with the invention of printing in the west in the fifteenth century, or even of written language itself in the ancient world. Others see it as merely evolutionary, a further application of...
Decision Procedures: An Algorithmic Point of View (Texts in Theoretical Computer Science. An EATCS Series)
Decision Procedures: An Algorithmic Point of View (Texts in Theoretical Computer Science. An EATCS Series)
A decision procedure is an algorithm that, given a decision problem, terminates with a correct yes/no answer. Here, the authors focus on theories that are expressive enough to model real problems, but are still decidable. Specifically, the book concentrates on decision procedures for first-order theories that are commonly used in automated...
Result Page: 650 649 648 647 646 645 644 643 642 641 640 639 638 637 636 635 634 633 632 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy