 |
|
|
 Design Aids for Eurocode 2: Design of concrete structures
Eurocode 2 is the key document for future structural design in concrete throughout Europe. To use the code effectively, structural engineers need a range of aids in the form of flow charts, design charts and simplified procedures. This book provides all these, and is written with the authority of collaborative work by members of the Concrete... |  |  Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael
Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web
reports, (before the term "Bl" came to embody what at the time we thought was an incredibly
innovative way to display call center metrics for managing... |  |  iPad: The Missing Manual
Apple announced the original iPad on January 27, 2010, and the
technology world hasn’t been the same since. Customers rushed to buy
the tablet, snapping up more than 300,000 the day it went on sale.
Competitors rushed to copy it, with Samsung, Motorola, Amazon, and others
creating their own variations on ... |
|
 iPod touch Made Simple, iOS 5 Edition (Made Simple Apress)
The new iOS 5-driven iPod touch devices are much more than just music. These have all the features of a PDA—including email, calendar, Google Maps, the App Store, and even phone capabilities—as well as the ability to watch movies and play your favorite games, all packed into Apple’s sleek design.
... |  |  Drush User's Guide
Drush is a command line interface for Drupal. Most of the tasks for building and maintaining a website are repetitive and involve filling in forms on administration pages. The majority of these tasks can be achieved with a single Drush command, drastically shortening the development and maintenance time of a project.
Drupal... |  |  Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky ... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |