|
|
|
|
Professional SQL Server 2000 Database DesignSQL Server 2000 is the latest and most powerful version of Microsoft's data warehousing and relational database management system.
Professional SQL Server 2000 Database Design provides an outline of the techniques that the designer can employ to make effective use of the full range of facilities that SQL Server 2000 offers. It attempts to move... | | Handbook of Mathematical Formulas and Integrals, Fourth EditionThis book contains a collection of general mathematical results, formulas, and integrals that occur throughout applications of mathematics. Many of the entries are based on the updated fifth edition of Gradshteyn and Ryzhik’s ”Tables of Integrals, Series, and Products,” though during the preparation of the book, results were also... | | Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)The 3rd edition of the well-known reference, Java in a Nutshell, covers the essential APIs of Java 1.2, including networking, security, input and output, and basic language and utility classes. Due to the size of the Java 1.2 API, graphics and graphical user interface classes are now examined in a volume called Java Foundation Classes... |
|
|
Flash MX Savvy (With CD-ROM)Anticipates your goals and uses professional examples to show you the best ways to attain them. Hands-on tutorials allows you to apply different techniques to projects that will yield useful, real-world results. Softcover. CD-ROM included.
This is the first book in our Savvy series, a new line of premium quality, in-depth... | | Programming Erlang: Software for a Concurrent WorldErlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.
Moore's Law is the observation that the amount you can do on a single chip... | | Algorithmic Cryptanalysis (Cryptography and Network Security)Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,... |
|
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 |