Home | Amazing | Today | Tags | Publishers | Years | Search 
.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Learn XML In a Weekend
Learn XML In a Weekend
Now you can learn how to use XML in just one weekend! Friday evening you’ll read about the<br><br>history of this language and see examples of its applications. On Saturday, you’ll break down the<br><br>elements of XML and learn how to use them correctly. You will also discover how to use XML...
Design Through Verilog HDL
Design Through Verilog HDL
A comprehensive resource on Verilog HDL for beginners and experts

Large and complicated digital circuits can be incorporated into hardware by using Verilog, a hardware description language (HDL). A designer aspiring to master this versatile language must first become familiar with its constructs, practice their use in real applications, and...

Complete Digital Design: A Comprehensive Guide to Digital Electronics and Computer System Architecture
Complete Digital Design: A Comprehensive Guide to Digital Electronics and Computer System Architecture
Digital systems are created to perform data processing and control tasks. What distinguishes one system from another is an architecture tailored to efficiently execute the tasks for which it was designed. A desktop computer and an automobile’s engine controller have markedly different attributes dictated by their unique requirements. Despite...
ATM Technology for Broadband Telecommunications Networks
ATM Technology for Broadband Telecommunications Networks
This textbook presents all the latest information on all aspects of each important component of ATM - the hottest telecommunications technology of this decade. It demonstrates how ATM internetworks several incompatible telecommunications technologies and provide the high-speed, high bandwidth backbone network that the entire telecom industry is...
Bioinformatics: Converting Data to Knowledge, Workshop Summary
Bioinformatics: Converting Data to Knowledge, Workshop Summary
In 1993 the National Research Council’s Board on Biology established a series of forums on biotechnology. The purpose of the discussions is to foster open communication among scientists, administrators, policy-makers, and others engaged in biotechnology research, development, and commercialization. The neutral setting offered by the National...
VBA For Dummies (Computer/Tech)
VBA For Dummies (Computer/Tech)
VBA helps you put your computer in its place

Write programs that automate tasks and make Office 2007 work better for you

If your computer is becoming your boss instead of your servant, start using VBA to tell it what to do! Here's the latest on the VBA IDE and program containers, debugging...

Computer Graphics Using Java 2D and 3D
Computer Graphics Using Java 2D and 3D

This Java handbook makes a practical tutorial on Java 2D and Java 3D for computer professionals. It contains in-depth coverage of basic computer graphics concepts and techniques, and introduces advanced graphic features to an audience mostly trained in the Java language. Chapter topics include mathematical background for computer graphics,...

Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves

Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves is a practical, hands-on discussion of the software estimation, planning, and control process. This includes critical factors that impact estimates, methods for selecting and applying appropriate measures to projects, proper software sizing, and...

Rootkits for Dummies (Computer/Tech)
Rootkits for Dummies (Computer/Tech)
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
Fuzzy Database Modeling with XML (Advances in Database Systems)
Fuzzy Database Modeling with XML (Advances in Database Systems)

Fuzzy Database Modeling with XML aims to provide a single record of current research and practical applications in the fuzzy databases. This volume is the outgrowth of research the author has conducted in recent years. Fuzzy Database Modeling with XML introduces state-of-the-art information to the database...

Technology Paradise Lost: Why Companies Will Spend Less to Get More from Information Technology
Technology Paradise Lost: Why Companies Will Spend Less to Get More from Information Technology
Debunking many of today’s myths about the future prospects and growth of information technology, this book uses a variety of well-accepted economic, technological, and market data to come to the contrary conclusion that IT is poised to shrink and not grow. Discussed is how this conclusion does not imply that companies will slow their use...
Result Page: 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 769 768 767 766 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy