Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Excel 2003 Programming Inside Out
Microsoft Excel 2003 Programming Inside Out

You’re a sophisticated user of Excel—a real pro with spreadsheets—so now dig into its powerful programming capabilities and really put your data to work! From writing code in Microsoft Visual Basic for Applications (VBA) to taking advantage of new XML data-sharing features, this book packs hundreds of timesaving programming...

Clojure High Performance Programming
Clojure High Performance Programming

Written for intermediate Clojure developers, this compact guide will raise your expertise several notches. It tackles all the fundamentals of analyzing and optimizing performance in clear, logical chapters.

Overview

  • See how the hardware and the JVM impact performance
  • Learn which Java...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Microsoft ASP. Net coding strategies with the Microsoft ASP. NET team
Microsoft ASP. Net coding strategies with the Microsoft ASP. NET team

Learn the strategies that developers at Microsoft use to build great ASP.NET applications—and get their sample programs! This in-depth insider’s guide shares the hard-won, hard-core coding experience of the Microsoft ASP.NET development team, revealing the most productive ways to exploit ASP.NET features and functionality to...

Real World Applications of Computational Intelligence (Studies in Fuzziness and Soft Computing)
Real World Applications of Computational Intelligence (Studies in Fuzziness and Soft Computing)
Computational Intelligence (CI) has emerged as a novel and highly diversified paradigm supporting the design, analysis and deployment of intelligent systems. The intellectual landscape of CI is enormously rich. The discipline of CI brings together technologies of granular computing including fuzzy sets and rough sets, neural networks, and...
Big Data and Analytics: Strategic and Organizational Impacts
Big Data and Analytics: Strategic and Organizational Impacts

This book presents and discusses the main strategic and organizational challenges posed by Big Data and analytics in a manner relevant to both practitioners and scholars. The first part of the book analyzes strategic issues relating to the growing relevance of Big Data and analytics for competitive advantage, which is also attributable to...

Introduction to Cryptography with Java Applets
Introduction to Cryptography with Java Applets
Cryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Expert SQL Server 2005 Development
Expert SQL Server 2005 Development
While building on the skills you already have, Expert SQL Server 2005 Development will help you become an even better developer by focusing on best practices and demonstrating how to design high-performance, maintainable database applications.

This book starts by reintroducing the database as a integral part of the software development...

Organic Chemistry
Organic Chemistry
From its first edition through this, its fourth, Organic Chemistry has been designed to meet the needs of the “mainstream,” two-semester, undergraduate organic chemistry course. It has evolved as those needs have changed, but its philosophy remains the same. The overarching theme is that organic chemistry is not...
Trade the Trader: Know Your Competition and Find Your Edge for Profitable Trading
Trade the Trader: Know Your Competition and Find Your Edge for Profitable Trading

When you trade, you're not just trading companies that deliver goods or services. You're trading against other traders who care about only one thing: taking your money. That's the #1 hard reality of trading - and most traders either don't know it, or don't act as if they do. In this book,...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy