Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Oracle ADF Enterprise Application Development – Made Simple: Second Edition
Oracle ADF Enterprise Application Development – Made Simple: Second Edition

The simplest way to learn Oracle's ADF is to follow an enterprise development process from start to finish, which is exactly what this book does. Combining theory with real-world examples, it's the ultimate guide for Oracle and J2EE developers.

Overview

  • Utilize best practices for real-life...
Control Engineering: A Modern Approach
Control Engineering: A Modern Approach

An exciting new text for the advanced controls course, Control Engineering: A Modern Approach breaks with tradition by introducing a number of new topics--robust controls, for example--and omitting a number of topics dated by the use of digital computers. Bélanger gives the student a real introduction to control engineering...

Programming PHP
Programming PHP

This updated edition teaches everything you need to know to create effective web applications with the latest features in PHP 5.x. You’ll start with the big picture and then dive into language syntax, programming techniques, and other details, using examples that illustrate both correct usage and common idioms.

If...

Williams Textbook of Endocrinology, 11e
Williams Textbook of Endocrinology, 11e

In your complex and dynamic field, it can be a struggle to continually integrate the latest scientific and clinical information into your everyday patient care. The 11th Edition of this beloved reference is the solution! Leading authorities provide just the right blend of scientific insight and clinical know-how to help you overcome any...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

C in Depth
C in Depth
In the third edition of the book C in depth , the authors explain the basics of the programming language while maintaining the integrity and clarity of the programs. The book can be utilized by both beginners and advanced level programmers as a self-evaluation and learning source. There are more than 310 programs with explanations to illustrate...
Microwave Circuit Modeling Using Electromagnetic Field Simulation
Microwave Circuit Modeling Using Electromagnetic Field Simulation
This unique 'how to' book is an ideal introduction to electromagnetic field-solvers. It provides you with helpful advice on selecting the right tools for your RF and high-speed digital circuit design work. The focus is on the strengths and weaknesses of the major commercial software packages. Featuring full-color illustrations, this practical...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Mastering AutoCAD 2008 and AutoCAD LT 2008
Mastering AutoCAD 2008 and AutoCAD LT 2008
The World's Bestselling AutoCAD Resource Fully Updated for 2008

There's a reason why Mastering AutoCAD is so popular year after year. Loaded with concise explanations, step-by-step instructions, and hands-on projects, this comprehensive reference and tutorial from award-winning author George Omura has everything you...

Oracle PL/SQL Best Practices
Oracle PL/SQL Best Practices
In this compact book, Steven Feuerstein, widely recognized as one of the world's leading experts on the Oracle PL/SQL language, distills his many years of programming, teaching, and writing about PL/SQL into a set of best practices-recommendations for developing successful applications. Covering the latest Oracle release, Oracle Database 11g,...
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
"Building networks with high performance demanded by today's applications requires a complete understanding of the basic principles and latest techniques. This book is the definitive guide to both."-Lyman Chapin

High-speed networking is the essential enabler of modern sophisticated distributed computing applications. This
...
unlimited object storage image
Result Page: 348 347 346 345 344 343 342 341 340 339 338 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy