Microsoft Windows 2000 Scripting Guide
Welcome to the Microsoft® Windows® 2000 Scripting Guide.
As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...
Business Services Orchestration: The Hypertier of Information Technology
Business Services Orchestration (BSO) is a new, unique, far-reaching industry technology encompassing the art of harmoniously organizing the interactions between business services. These business services may represent internal business processes of organizations. Integration of many of these internal legacy, custom, and COTS applications may,...
Expert .NET Micro Framework The Microsoft .NET Micro Framework is a small and efficient .NET runtime environment used to run managed code on devices that are too small and resource constrained for Windows CE and the Compact Framework.
Expert .NET Micro Framework will teach you everything you need to know in order to use the .NET Micro Framework to create effective...
Concentrator Photovoltaics (Springer Series in Optical Sciences) Photovoltaic solar-energy conversion is one of the most promising technologies for generating renewable energy, and conversion of concentrated sunlight can lead to reduced cost for solar electricity. In fact, photovoltaic conversion of concentrated sunlight insures an efficient and cost-effective sustainable power resource. This book gives an... 101 Boardroom Problems and How to Solve Them Before becoming a consultant on meetings and effective decision making, I was employed as an engineer. My motto then was: Silence is golden. Keeping quiet in meetings was safe and risk-free, and rarely did anyone solicit my ideas anyway. Had I shared my input, however, it might have improved the quality of my team’s decisions and reduced its...
Security 2020: Reduce Security Risks This Decade
Identify real security risks and skip the hype
After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...
A hands-on approach to mastering the fundamentals of Grunt
Gain insight on the core concepts of Grunt, Node.js and npm to get started with Grunt.
Learn how to install, configure, run, and customize Grunt
Example-driven and filled with tips to help you create custom...
|Result Page: 279 278 277 276 275 274 273 272 271 270 |