Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CIL Programming: Under the Hood of .NET
CIL Programming: Under the Hood of .NET
This resource covers the essentials of programming the CIL, and discusses the basics of what .NET assemblies are and how manifests fit into the picture, as well as how to create assemblies in .NET.
  • Shows how and why programmers “touch the metal” and program CIL directly
  • Includes information on the...
SAS for Forecasting Time Series, Second Edition
SAS for Forecasting Time Series, Second Edition
In this second edition of the indispensable SAS for Forecasting Time Series, Brocklebank and Dickey show you how SAS performs univariate and multivariate time series analysis. Taking a tutorial approach, the authors focus on the procedures that most effectively bring results: the advanced procedures ARIMA, SPECTRA, STATESPACE, and VARMAX....
Star Schema The Complete Reference
Star Schema The Complete Reference

The definitive guide to dimensional design for your data warehouse

Learn the best practices of dimensional design. Star Schema: The Complete Reference offers in-depth coverage of design principles and their underlying rationales. Organized around design concepts and illustrated with detailed examples, this is a...

Mastering Zabbix
Mastering Zabbix

Learn how to refine and organize your IT monitoring systems using your existing working knowledge of Zabbix. This step-by-step tutorial will help you unleash the full capabilities of the system.

Overview

  • Create the perfect monitoring configuration based on your specific needs
  • Extract...
IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Geometric Computing Science: First Steps (Interdisciplinary Mathematics, Vol 25)
Geometric Computing Science: First Steps (Interdisciplinary Mathematics, Vol 25)
This book outlines a mathematical way of thinking about the interaction of 'pure' and 'applied' computer science. I will be more subjective than is customary in science and mathematics exposition and sketch my personal vision, in terms of my own experience in pure and applied mathematics and my extensive readings in the scholarly computer science...
Herb Schildt's C++ Programming Cookbook
Herb Schildt's C++ Programming Cookbook

Your Ultimate "How-To" Guide to C++ Programming!

Legendary programming author Herb Schildt shares some of his favorite programming techniques in this high-powered C++ "cookbook." Organized for quick reference, each "recipe" shows how to accomplish a practical programming task. A recipe...

C++ Template Metaprogramming : Concepts, Tools, and Techniques from Boost and Beyond (C++ in Depth Series)
C++ Template Metaprogramming : Concepts, Tools, and Techniques from Boost and Beyond (C++ in Depth Series)

"If you're like me, you're excited by what people do with template metaprogramming (TMP) but are frustrated at the lack of clear guidance and powerful tools. Well, this is the book we've been waiting for. With help from the excellent Boost Metaprogramming Library, David and Aleksey take TMP from the laboratory to the...

Network Consultant's Handbook
Network Consultant's Handbook
A complete resource for assessing, auditing, analyzing, and evaluating any network environment

With Network Consultants Handbook, you will

  • Learn from network audit and evaluation guidelines that aid in data gathering and analysis of network environments
  • Work with tables and...
KDE Programming Bible
KDE Programming Bible
(IDG Books) A tutorial packed with examples, lucid explanations, and a complete widget reference, showing how to take full advantage of the K desktop and 2/Qt toolkit for Linux. The CD-ROM contains all of the examples from the text and KDE 2/Qt core files and libraries. System requirements: Intel 486+, 156 MB+ Hard drive space, 16MB+ RAM, CD-ROM...
Apache MyFaces 1.2 Web Application Development
Apache MyFaces 1.2 Web Application Development

Hypes and trends (such as Web 2.0) cause a change in the requirements for user interfaces every now and then. While a lot of frameworks are capable of meeting those changing requirements, it often means you as a developer need in-depth knowledge of web standards, such as XHTML and JavaScript. A framework like Apache MyFaces that hides all...

The Ultimate Digital Music Guide: The Best Way to Store, Organize, and Play Digital Music
The Ultimate Digital Music Guide: The Best Way to Store, Organize, and Play Digital Music

Iam a music lover. Big time. My wife and I try to catch at least one or two major shows a month, and I’m an “A Train” member of and frequent visitor to our local jazz club. (That’s the Dakota Jazz Club in Minneapolis, one of the best in the nation.) I have more than 1,700 albums in my music collection, or more than...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy