 |
|
 Developing Drivers with the Windows Driver FoundationGet in-depth, expert guidance on developing drivers for Windows
Start developing robust drivers with expert guidance from the team who developed Windows Driver Foundation. This comprehensive book gets you up to speed quickly and goes beyond the fundamentals to help you extend your Windows development skills. You get best practices,... |  |  Mastering Microsoft Exchange Server 2007By utilizing the latest features of Microsoft Exchange Server 2007, you'll be able to provide your company with the security it needs while enabling employees to access critical information regardless of their location or type of device.
Now with this comprehensive guide, you'll find out how to effectively install, configure, and manage... |  |  Introducing AutoCAD 2008Quickly Master AutoCAD 2008 Essentials
This practical guide helps users of all skill levels learn the basics of AutoCAD 2008 and AutoCAD LT 2008 easily and efficiently. In this fresh new take on the popular Just Enough AutoCAD, bestselling AutoCAD author and expert George Omura offers clear explanations, a task-based approach,... |
|
|
|
 Data Structures and Algorithms in C++, Second EditionThe study of data structures, a fundamental component of a computer science education, serves as the foundation upon many other computer science fields are built. Some knowledge of data structures is a must for students who wish to do work in design implementation, testing, or maintenace of virtually any software system. The scope and presentation... |  |  Advances in Fuzzy Clustering and its ApplicationsA comprehensive, coherent, and in depth presentation of the state of the art in fuzzy clustering.
Fuzzy clustering is now a mature and vibrant area of research with highly innovative advanced applications. Encapsulating this through presenting a careful selection of research contributions, this book... |  |  Applied Cryptanalysis: Breaking Ciphers in the Real WorldThe book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material... |
|
Result Page: 862 861 860 859 858 857 856 855 854 853 852 851 |