Home | Amazing | Today | Tags | Publishers | Years | Search 
Professional Visual Basic 2008 (Programmer to Programmer)
Professional Visual Basic 2008 (Programmer to Programmer)
In 2002, Visual Basic took the biggest leap in innovation since it was released, with the introduction of Visual Basic .NET (as it was renamed). After more than a decade, Visual Basic was overdue for a major overhaul. Nevertheless, .NET goes beyond an overhaul. It changes almost every aspect of software development. From integrating Internet...
Petascale Computing: Algorithms and Applications (Chapman & Hall/Crc Computational Science Series)
Petascale Computing: Algorithms and Applications (Chapman & Hall/Crc Computational Science Series)
Although the highly anticipated petascale computers of the near future will perform at an order of magnitude faster than today’s quickest supercomputer, the scaling up of algorithms and applications for this class of computers remains a tough challenge. From scalable algorithm design for massive concurrency toperformance analyses and...
QoS-Based Resource Allocation and Transceiver Optimization (Foundations and Trends(R) in Communications and Information Theory)
QoS-Based Resource Allocation and Transceiver Optimization (Foundations and Trends(R) in Communications and Information Theory)
QoS-Based Resource Allocation and Transceiver Optimization derives a comprehensive theoretical framework for SIR balancing, with and without noise. The theory considers the possible use of receive strategies (e.g. interference filtering or channel assignment), which can be included in the model in an abstract way. Power allocation and receiver...
Sams Teach Yourself Visual Basic .NET Web Programming in 21 Days
Sams Teach Yourself Visual Basic .NET Web Programming in 21 Days
Visual Basic.NET will integrate state of the art programming language features, including inheritance, polymorphism, and garbage collection. The book will explain these key concepts in a simple and practical way.* Web Forms and Web Controls usher in an elegant way to make dynamic web pages. The book will cover these topics with how-to code...
Innovative Technologies for Information Resources Management (Premier Reference Source)
Innovative Technologies for Information Resources Management (Premier Reference Source)
As information resources management becomes increasingly dependent on emerging technologies to combat its challenges and decipher its effective strategies, the demand builds for a critical mass of research in this area.

Innovative Technologies for Information Resources Management brings together compelling content related to...

Information Technology Policy: An International History
Information Technology Policy: An International History
This book brings together a series of country-based studies to examine, in depth, the nature and extent of IT policies as they have evolved from a complex historical interaction of politics, technology, institutions, and social and cultural factors. In doing so many key questions are critically examined. Where can we find successful examples of IT...
Visual Data Mining: Theory, Techniques and Tools for Visual Analytics (Lecture Notes in Computer Science)
Visual Data Mining: Theory, Techniques and Tools for Visual Analytics (Lecture Notes in Computer Science)
The importance of visual data mining, as a strong sub-discipline of data mining, had already been recognized in the beginning of the decade. In 2005 a panel of renowned individuals met to address the shortcomings and drawbacks of the current state of visual information processing. The need for a systematic and methodological development of visual...
Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers
Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers
If you are interested in learning about Web 2.0 and the history of its development, Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers contains all the information you need to understand Web 2.0 and its importance. Read first person accounts from industry leaders and innovators, who describe the influence and potential of Web 2.0, a...
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Component Database Systems (The Morgan Kaufmann Series in Data Management Systems)
Component Database Systems (The Morgan Kaufmann Series in Data Management Systems)
I recently came across a fascinating book, Regional Advantage—Culture and Competition in Silicon Valley and Route 128.1 The author compares the rise and dominance of Silicon Valley during the 1970s and 1980s with the slow decline of Route 128 during the 1980s and hypothesizes that the contrasts in development were mainly due to the large...
Programming With Visibroker : A Developer's Guide to Visibroker for Java
Programming With Visibroker : A Developer's Guide to Visibroker for Java
Coauthored by the lead architect for the VisiBroker Java ORB, this is the authoritative guide to programming with VisiBroker for Java. Designed to help Java developers quickly master the skills they need to develop more powerful and sophisticated distributed, object-oriented, client/server systems from scratch or by combining existing...
F. Scott Barker's Microsoft Access 2002 Power Programming (Kaleidoscope)
F. Scott Barker's Microsoft Access 2002 Power Programming (Kaleidoscope)
F. Scott Barker's Access 2002 Power Programming gives many practical techniques for the corporate and independent developer.

The main topics covered are:

  • The Root of Power Programming;
  • Manipulating and Presenting Data;
  • Extending Access with Interoperability;
  • Adding the...
Result Page: 862 861 860 859 858 857 856 855 854 853 852 851 850 849 848 847 846 845 844 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy