Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft BizTalk Server 2004 Unleashed
Microsoft BizTalk Server 2004 Unleashed
Microsoft BizTalk Server 2004 Unleashed is your tool to unleash the power of Microsoft's BizTalk Server 2004. Learn how to use the server as an enterprise application integration tool and how to exploit its key strengths to orchestrate e-commerce business processes in B2B and B2C environments. Providing complete...
Optimizing Compilers for Modern Architectures: A Dependence-based Approach
Optimizing Compilers for Modern Architectures: A Dependence-based Approach

Modern computer architectures designed with high-performance microprocessors offer tremendous potential gains in performance over previous designs. Yet their very complexity makes it increasingly difficult to produce efficient code and to realize their full potential. This landmark text from two leaders in the field focuses on the pivotal role...

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
System-level Test and Validation of Hardware/Software Systems (Springer Series in Advanced Microelectronics)
System-level Test and Validation of Hardware/Software Systems (Springer Series in Advanced Microelectronics)
New manufacturing technologies have made possible the integration of entire systems on a single chip. This new design paradigm, termed system-on-chip (SOC), together with its associated manufacturing problems, represents a real challenge for designers.

SOC is also reshaping approaches to test and validation activities. These are beginning to...

Getting started with IntelliJ IDEA
Getting started with IntelliJ IDEA

Exploit IntelliJ IDEA’s unique features to rapidly develop web and Java Enterprise applications

Overview

  • Exhibit techniques that improve development performance
  • Present framework support
  • Create an application that explores the features of the integrated development...
Backbone.js Blueprints
Backbone.js Blueprints

Everything you need to know about building front end apps in Backbone.js is contained in this book. Packed with projects, code, and sound explanations, it’s the essential guide to this indispensable JavaScript library.

Overview

  • Gain insights into the inner working of Backbone to leverage it...
WPF 4 Unleashed
WPF 4 Unleashed

The #1 WPF Book--Now Updated for WPF 4!

 

Full Color: Code samples appear as they do in Visual Studio!

 

Thorough, authoritative coverage, practical examples, clear writing, and...

XML Web Services in the Organization
XML Web Services in the Organization

Discover how you can use XML-based Web services to dramatically improve the data sharing and communication capabilities in your organization. This pragmatic guide teaches you how to exploit the interoperability features of the Microsoft .NET Framework to build highly available, platform-independent Web services. Easy-to-follow sample...

Real World Camera Raw with Adobe Photoshop CS5
Real World Camera Raw with Adobe Photoshop CS5

If you’re reading this book because you want to be told that digital really is better than film, look elsewhere. The term “digital photography” may still be in current use, but sooner rather than later, it will be replaced by the simple term “photography.” If you want to be told that shooting digital raw is...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Apple Motion 5 Cookbook
Apple Motion 5 Cookbook

With this book you'll be able to fully exploit the fantastic features of Apple Motion. There are over 110 recipes with downloadable content for each chapter and stacks of screenshots. A video editor's dream.

Overview

  • Easy to follow, hands-on instructions that simplify the learning process
  • ...
Cisco Network Design Solutions for Small-Medium Businesses
Cisco Network Design Solutions for Small-Medium Businesses

Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.

  • Design and implement effective network solutions by mastering the design process that is used by...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy