Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming .NET Compact Framework 3.5 (2nd Edition)
Programming .NET Compact Framework 3.5 (2nd Edition)
WE FEEL PRETTY FORTUNATE. During the past three decades, we have traveled the world teaching programmers what we know. Between the two of us, we have led hundreds of classes and taught thousands of professional programmers. We enjoy working with the people who are inventing the future, andwehave been fortunate enough to have been at the cutting...
Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management
Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management
Consider that 80 percent of the information within most organizations is unstructured: word processing files, e-mail, spreadsheets, Web content, images, graphics, and all the other digital assets that organizations create and use as part of their business processes. Fully 90 percent of this unstructured information remains unmanaged within most...
Practical Virtualization Solutions: Virtualization from the Trenches
Practical Virtualization Solutions: Virtualization from the Trenches
A few years ago, the idea of running multiple operating systems concurrently on the same computer captured the imagination of the computing industry. Virtualization became the hot buzzword and projects were launched to fulfill the dream.

With virtualization, you don’t need an extra computer every time you want to bring up a new
...
Embedded Systems Handbook, Second Edition: Networked Embedded Systems (Industrial Information Technology)
Embedded Systems Handbook, Second Edition: Networked Embedded Systems (Industrial Information Technology)
Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to...
The Radical Leap: A Personal Lesson in Extreme Leadership
The Radical Leap: A Personal Lesson in Extreme Leadership
The business world is ready for an entirely new approach to leadership, and Steve Farber has written the perfect book to energize business leaders and help them make the leap into extreme leadership. In fact, taking a giant "L.E.A.P" forward is exactly what Farber prescribes. What exactly is an extreme leader? One who cultivates love,...
The Hidden Power of Illustrator CS Web Graphic Techniques
The Hidden Power of Illustrator CS Web Graphic Techniques
Adobe Illustrator has long been the industry's dominant illustration package. In this latest version, Adobe added a suite of extremely powerful, highly integrated web tools which are the focus of Steve Kurth's The Hidden Power of Illustrator CS: Web Graphic Techniques. Whether you're a Web designer making websites from scratch or a print designer...
Risk Management and Value Creation in Financial Institutions
Risk Management and Value Creation in Financial Institutions
From an empirical as well as a personal point of view, risk management in the financial industry has been one of the most exciting and most researched areas over the last decade. Depositors and regulators claim that risk management is necessary, and many banks argue that superior risk management can create (shareholder) value. However, from a...
The Digital Photography Book, Volume 2
The Digital Photography Book, Volume 2
Scott Kelby, author of the groundbreaking bestseller “The Digital Photography Book, Vol. 1” is back with an entirely new book that picks up right where Vol. 1 left off. It’s more of that “Ah ha—so that’s how they do it,” straight-to-the-point, skip the techno jargon; packed with stuff you can really use...
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic...
Work Naked: Eight Essential Principles for Peak Performance in the Virtual Workplace
Work Naked: Eight Essential Principles for Peak Performance in the Virtual Workplace
"Enlightening, enjoyable, and extremely practical, Work Naked offers real clarity about what is wrong with the way most companies work, plus exact directions on how to fix each and every office foolishness. Do what Froggatt says and watch your employee productivity rise." --Scott Shuster, Business Week "High-tech tools (cell...
The Fashion Business: Theory, Practice, Image (Dress, Body, Culture Series)
The Fashion Business: Theory, Practice, Image (Dress, Body, Culture Series)
This book derives from a series of lectures organised by Kingston University in collaboration with the Italian manufacturer retailer MaxMara. The lectures, entitled ‘Perspectives in Fashion’, were launched in 1994 to explore emerging themes in the history and theory of fashion, with the objective of considering them in the context of...
Pro SQL Server 2008 Administration
Pro SQL Server 2008 Administration

Pro SQL Server 2008 Administration is critical for database administrators seeking in-depth knowledge on administering SQL Server 2008. This book covers the impact of the new features available in SQL Server 2008 specifically targeted for database administrators, along with the tried-and-true advanced techniques required to support and...

Result Page: 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy