Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft AJAX Library Essentials: Client-side ASP.NET AJAX 1.0 Explained
Microsoft AJAX Library Essentials: Client-side ASP.NET AJAX 1.0 Explained
AJAX is a complex phenomenon that means different things to different people. Computer users appreciate that their favorite websites are now friendlier and feel more responsive. Web developers learn new skills that empower them to create sleek web applications with little effort. Indeed, everything sounds good about AJAX! At its roots, AJAX is a...
Reverse Engineering Code with IDA Pro
Reverse Engineering Code with IDA Pro

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...

Programming and Customizing the PIC Microcontroller (Tab Electronics)
Programming and Customizing the PIC Microcontroller (Tab Electronics)
For complete, practical insight into the chip that is quickly becoming the microcontroller of choice throughout the world. The use of Microchip's PIC family of microcontrollers is growing rapidly worldwide. This tutorial/disk package is unique in providing you with a complete understanding of the PIC chip and all the information needed to design...
Law of Financial Success
Law of Financial Success
1907. Contents: Money; Mental attitude; Fear and worry; Faith; Latent powers; Ambition; Desire; Will power; Auto-suggestion; Harmony; Creation; Concentration; Persistence; Habit; Claiming your own; Making money.

There is no idea that seems so much misunderstood as this idea of "Money." On the one hand we find many
...
IT Service Management Guide: Vol. 1
IT Service Management Guide: Vol. 1
The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.

For decades,
...
101 Outer Space Projects for the Evil Genius
101 Outer Space Projects for the Evil Genius
Before I became a world-famous nonfiction author (no, really, this guy in Hong Kong knows me and he thinks I’m pretty good at what I do), I tried my typewriter at spinning fictional yarns. Lucky for me (and you) this creative writing venture didn’t pan out.

During this short “fictional” period of my life, I wrote
...
Dungeons & Dragons  Dummies
Dungeons & Dragons Dummies
Caught in traffic. Trapped in a cubicle. Stuck in a rut.  Tangled up in red tape.

In the real world, sometimes you feel powerless—but not in Dungeons & Dragons (D & D). In this fantasy-adventure, you have all kinds of special powers. You can slay the evil dragon, overcome the orc or the ogre, haunt the...

Foundations of Agile Python Development (Expert's Voice in Open Source)
Foundations of Agile Python Development (Expert's Voice in Open Source)
You’ve long been enamored with the Python language, and have mastered its many nuances. Yet something seems to be missing—a productivity boost that you know is possible but you’re not sure how to go about it. This was the sentiment of so many developers before discovering Agile programming paradigm, which embraces concepts such as...
XML Schemas
XML Schemas
To many XML believers and purists, there’s been a canker at the heart of the beautiful rose that is XML since its very inception. Worse still, some believe that canker was put there by design. That canker is, of course, the Document Type Definition, or DTD, that defines the very essence of XML. DTDs are “foreign imports” based on...
Winning with Software: An Executive Strategy (SEI Series in Software Engineering)
Winning with Software: An Executive Strategy (SEI Series in Software Engineering)

When I mention software to senior executives, I get lots of reactions. Most are frustrated. They complain about missed commitments, quality problems, and unpleasant surprises. Others have been less closely involved. Software was a problem, but those problems have been handled. No one mentions the business opportunities of...

Popular Psychology: An Encyclopedia
Popular Psychology: An Encyclopedia

The mysteries of the human mind and human behavior have been a source of fascination and speculation throughout recorded history, and surely, for a long time before that. Attempts to explain human thoughts, emotions, and behavior, especially when they are disordered, go back just as long; and have often involved magic, evil spirits, invisible...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy