Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Creating Database Web Applications with PHP and ASP (Internet Series)
Creating Database Web Applications with PHP and ASP (Internet Series)

Creating Database Web Applications with PHP and ASP teaches beginning and intermediate designers the fundamentals of creating complex Web applications. By covering both open source (PHP/MySQL) and proprietary tools (Microsoft ASP and Access), readers gain insight to the strengths and weaknesses of each. In addition, they learn how...

A Manager's Guide to Employment Law: How to Protect Your Company and Yourself
A Manager's Guide to Employment Law: How to Protect Your Company and Yourself
A Manager's Guide to Employment Law:
  • Explains the fundamental concept of employmentlaw— employment-at-will — and how it has changed over recent years
  • Coaches managers on the specifics of evaluating the opportunities and risks associated with workforce decisions
  • Covers...
An Introduction to Genetic Algorithms (Complex Adaptive Systems)
An Introduction to Genetic Algorithms (Complex Adaptive Systems)

Science arises from the very human desire to understand and control the world. Over the course of history, we
humans have gradually built up a grand edifice of knowledge that enables us to predict, to varying extents, the
weather, the motions of the planets, solar and lunar eclipses, the courses of diseases, the rise and fall
...

EJB Design Patterns: Advanced Patterns, Processes, and Idioms
EJB Design Patterns: Advanced Patterns, Processes, and Idioms
A lot of programming involves solving the same kinds of basic problems. Well, what if a community of experts got together and pooled their knowledge to come up with the best programming practices for solving these problems? You would have what are known as design patterns.
Author Floyd Marinescu, a leading expert on EJB, worked with the
...
Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications presents both theories and applications of computational intelligence in a clear, precise and highly comprehensive style. The textbook addresses the fundamental aspects of fuzzy sets and logic, neural networks, evolutionary computing and belief networks. The...
Aircraft Structures for Engineering Students, Fourth Edition (Elsevier Aerospace Engineering)
Aircraft Structures for Engineering Students, Fourth Edition (Elsevier Aerospace Engineering)
Aircraft Structures for Engineering Students is a self-contained text for students of aerospace and mechanical engineering. It covers all the fundamental subjects taken in an aircraft structural design and analysis course, including elasticity, structural mechanics and analysis, airworthiness and aeroelasticity. It is ideal for use...
Spring Persistence with Hibernate (Beginning)
Spring Persistence with Hibernate (Beginning)

Persistence is an important set of techniques and technologies for accessing and transacting data, and ensuring that data is mobile regardless of specific applications and contexts. In Java development, persistence is a key factor in enterprise, e-commerce, and other transaction-oriented applications.

Today, the Spring Framework is...

Concurrent Programming on Windows
Concurrent Programming on Windows

“When you begin using multi-threading throughout an application, the importance of clean architecture and design is critical. . . . This places an emphasis on understanding not only the platform’s capabilities but also emerging best practices. Joe does a great job interspersing best practices alongside theory...

Everyday Cryptography: Fundamental Principles and Applications
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...

LDAP Directories Explained: An Introduction and Analysis
LDAP Directories Explained: An Introduction and Analysis

Directory technology promises to solve the problem of decentralized information that has arisen with the explosion of distributed computing. Lightweight Directory Access Protocol (LDAP) is a set of protocols that has become the Internet standard for accessing information directories. Until now, however, those curious about...

Solving the PowerPoint Predicament: Using Digital Media for Effective Communication
Solving the PowerPoint Predicament: Using Digital Media for Effective Communication

Everyone uses PowerPoint, but how effective is your presentation at meeting the goals you've outlined? A great presentation is more than just a slideshowit's about using PowerPoint to its maximum potential to get your message across to your audience. That's the PowerPoint Predicament. Tom Bunzel reveals how to conceive, plan,...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
unlimited object storage image
Result Page: 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy