Home | Amazing | Today | Tags | Publishers | Years | Search 
SQL All-in-One Desk Reference For Dummies (Computer/Tech)
SQL All-in-One Desk Reference For Dummies (Computer/Tech)

Master queries for any SQL database!

Your one-stop guide to building and maintaining relational databases with SQL

If you're looking for a good general reference on SQL, look no further. This all-in-one guide delivers the goods on all major SQL topics, from basic concepts to the...

Writing Secure Code for Windows Vista (Pro - Step By Step Developer)
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)

Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...

Professional VB 2005 with .NET 3.0 (Programmer to Programmer)
Professional VB 2005 with .NET 3.0 (Programmer to Programmer)

Get ready to give your programming skills a boost by learning how to write robust applications in Visual Basic. This comprehensive resource not only takes you through the latest features of Visual Basic 2005 but also shows you how to apply this powerful language in the .NET Framework 3.0. Along the way, it provides you with sample code and best...

IP Quality of Service (Cisco Networking Fundamentals)
IP Quality of Service (Cisco Networking Fundamentals)
The complete resource for understanding and deploying IP quality of service for Cisco networks

Learn to deliver and deploy IP QoS and MPLS-based traffic engineering by understanding:

  • QoS fundamentals and the need for IP QoS
  • The Differentiated Services QoS architecture and its enabling QoS functionality...
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Advances in Fuzzy Clustering and its Applications
Advances in Fuzzy Clustering and its Applications

A comprehensive, coherent, and in depth presentation of the state of the art in fuzzy clustering.

Fuzzy clustering is now a mature and vibrant area of research with highly innovative advanced applications. Encapsulating this through presenting a careful selection of research contributions, this book...

Knowledge-Based Neurocomputing
Knowledge-Based Neurocomputing
Neurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based...
Software Testing and Analysis: Process, Principles and Techniques
Software Testing and Analysis: Process, Principles and Techniques
The first comprehensive book on software test and analysis

You can't “test quality into” a software product, but neither can you build a quality software product without test and analysis.  Software test and analysis is increasingly recognized, in research and in industrial practice, as a core challenge in...

Analog-Baseband Architectures and Circuits: for Multistandard and Low-Voltage Wireless Transceivers
Analog-Baseband Architectures and Circuits: for Multistandard and Low-Voltage Wireless Transceivers
Analog-Baseband Architectures and Circuits reviews the fundamentals and studies the state-of-the-art multistandard transceivers before describing novel architectural and circuit techniques for implementing multimode and wideband (tens of MHz) baseband analog front-ends under low-voltage constraints. Techniques developed on architecture...
Business Process Management: Concepts, Languages, Architectures
Business Process Management: Concepts, Languages, Architectures
Business process management is usually treated from two different perspectives: business administration and computer science. While business administration professionals tend to consider information technology as a subordinate aspect for experts to handle, by contrast computer scientists often consider business goals and organizational regulations...
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
Biometric Authentication: First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004
The past decade has seen a rapid growth in the demand for biometric-based authentication solutions for a number of applications. With significant advances in biometric technology and an increase in the number of applications incorporating biometrics, it is essential that we bring together researchers from academia and industry as well as...
Secure Roaming in 802.11 Networks (Communications Engineering)
Secure Roaming in 802.11 Networks (Communications Engineering)
WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide...
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy