Home | Amazing | Today | Tags | Publishers | Years | Search 
Developing Scalable Series 40 Applications : A Guide for Java Developers (Nokia Mobile Developer)
Developing Scalable Series 40 Applications : A Guide for Java Developers (Nokia Mobile Developer)

The First Official End-To-End Solutions Guide for Every Nokia Series 40 Developer

Nokia's Series 40 Developer Platform gives Java developers access to the world's highest-volume, fastest-growing, and most exciting mobile markets. Nokia sells close to 100 million units...

Secure XML: The New Syntax for Signatures and Encryption
Secure XML: The New Syntax for Signatures and Encryption

Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical...

Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003
Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003

Get real-world guidance—direct from the Microsoft Windows Server 2003 team—for planning and deploying an upgrade from Windows NT 4.o to Windows Server 2003 for your small or medium-sized business. This book delivers straightforward, step-by-step instructions on how to upgrade to an Active Directory directory service environment;...

What is Lean Six Sigma
What is Lean Six Sigma

Lean Six Sigma combines the two most important improvement trends of our time: making work better (using Six Sigma) and making work faster (using Lean principles). In this plain-English guide, you’ll discover how this remarkable quality improvement method can give you the tools to identify and eliminate waste and quality problems in...

UNIX® Shells by Example, Third Edition
UNIX® Shells by Example, Third Edition

Five UNIX shells, three essential utilities, one indispensable resource!

  • Learn UNIX shell programming the easy way, using hands-on examples

  • Covers all five leading UNIX shells-C, Bourne, Korn, bash, and tcsh

  • ...
Layer 2 VPN Architectures (Networking Technology)
Layer 2 VPN Architectures (Networking Technology)

Master the world of Layer 2 VPNs to provide enhanced services and enjoy productivity gains

  • Learn about Layer 2 Virtual Private Networks (VPNs)

  • Reduce costs and extend the reach of your services by unifying your network architecture

    ...
Pocket PC Network Programming
Pocket PC Network Programming

Pocket PC Network Programming is the resource developers need to exploit the power of mobile technology and high-speed wireless connections. This book is a comprehensive tutorial and reference for writing network applications on Pocket PC 2002 and Pocket PC 2002 Phone Edition devices. It...

Real World ASP.NET Best Practices
Real World ASP.NET Best Practices

ASP.NET is a wonderful new enabling technology that allows developers to create business solutions much more effectively than ever before. However, there is room for improvement. Developers often do not see the potholes and pitfalls related to this technology until they stumble. Real World ASP.NET Best Practices helps readers to...

Writing Mobile Code : Essential Software Engineering for Building Mobile Applications
Writing Mobile Code : Essential Software Engineering for Building Mobile Applications

Mobile computing devices have evolved from fixed-purpose communications tools to compelling and extensible mass-market computing platforms. Now, they stand poised to offer truly ubiquitous and mobile computingand to revolutionize the way people work, communicate, and interact with the world around them.

...
C#® Developer's Guide to ASP.NET, XML, and ADO.NET
C#® Developer's Guide to ASP.NET, XML, and ADO.NET

The book every Internet application developer working with Microsoft development tools needs to retool their knowledge of the new .NET techniques used to build Windows applications.

  • Unbiased, in-depth commentary on the efficacy of the various technologies that comprise .NET as they...

Best Kept Secrets in .NET
Best Kept Secrets in .NET

Author Deborah Kurata has spoken to .NET user groups all over America sharing her “Best Kept Secrets in .NET,” and she often hears experienced developers say, “I didn’t know you could do that with .NET!” This book is a collection of Deborah’s insights into .NET secrets that can enhance your productivity and...

Linux Debugging and Performance Tuning : Tips and Techniques
Linux Debugging and Performance Tuning : Tips and Techniques

This is the definitive guide to Linux software debugging and performance optimization at both the kernel and application levels. Using extensive Linux code examples, Steve Best systematically introduces open source tools and best-practice techniques for delivering bug-free, well-tuned code.

Drawing on...

Result Page: 716 715 714 713 712 711 710 709 708 707 706 705 704 703 702 701 700 699 698 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy