Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning T-SQL 2008
Beginning T-SQL 2008
Welcome to Beginning T-SQL 2008. This book introduces you to the language known as T-SQL, also called Transact-SQL. It’s the fundamental language that you need to know in order to work productively with Microsoft’s database management system known as SQL Server. Almost everything that you do in SQL Server boils down to T-SQL commands,...
Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)
Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)
The scope, complexity, and pervasiveness of computer-based and controlled systems continue to increase dramatically. The consequences of these systems failing can range from the mildly annoying to catastrophic, with serious injury occurring or lives lost, human-made and natural systems destroyed, security breached, businesses failed, or...
Professional Verification: A Guide to Advanced Functional Verification
Professional Verification: A Guide to Advanced Functional Verification
Professional Verification is a guide to advanced functional verification in the nanometer era. It presents the best practices in functional verification used today and provides insights on how to solve the problems that verification teams face. Professional Verification is based on the experiences of advanced...
Encyclopedia of Islam & the Muslim World
Encyclopedia of Islam & the Muslim World
A growing number of scholars and pundits have declared that the twenty-first century will be the era of Islam. Such predictions, whether intended in a positive or negative light, err in failing to appreciate the spread and influence of Islam during the past millennium and a half, especially on the continents of Asia and Africa. Nonetheless, events...
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

How to Master the Art of Selling from SmarterComics
How to Master the Art of Selling from SmarterComics

After failing during the first six months of his career in sales, Tom Hopkins discovered and applied the very best sales techniques, then earned more than one million dollars in just three years. What turned Tom Hopkins around? The answers are revealed in How to Master the Art of Selling from SmarterComics, as Tom explains to readers what the...

Project Management Simulation with PTB Project Team Builder
Project Management Simulation with PTB Project Team Builder

“The Project Team Builder (PTB) meets the need for an effective teaching and training tool of project management. The software introduces the user to the full dynamics of project planning, monitoring and control, moving scenario-wise from the easy, fundamental issues to the more involved, complex ones. Based on a sound conceptual...

JavaScript at Scale
JavaScript at Scale

Build web applications that last, with scaling insights from the front-line of JavaScript development

About This Book

  • Design and implement JavaScript application architectures that scale from a number of perspectives, such as addressability, configurability, and performance
  • Understand...
Web Mobile-Based Applications for Healthcare Management
Web Mobile-Based Applications for Healthcare Management
In recent years, there has been a veritable literary frenzy on the theme of healthcare and the Internet. In these works, however, there has not been adequate attention paid to the role that potential users of the site (patients, general practitioners, healthcare personnel, students, private doctors, other healthcare organizations, etc.) could and...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

101 Smart Questions to Ask on Your Interview
101 Smart Questions to Ask on Your Interview

This book is for every job candidate who thinks "Do you have any questions for me?" marks the end of an interview. It doesn't. In fact, it marks the beginning of the last and perhaps most important interview phase - a phase so important that failing to prepare properly for it can undo all your hard work, including providing...

Professional Web Design: The Best of Smashing Magazine (Smashing Magazine Book Series)
Professional Web Design: The Best of Smashing Magazine (Smashing Magazine Book Series)

Create Fantastic Web Sites with Advice From Some of the Best in the Industry

Professional Web Design presents guidelines for professional Web development, including communicating with clients, creating a road map to a successful portfolio, rules for professional networking, and tips on designing user interfaces for business...

Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy