|
|
|
|
Microsoft SQL Server 2008 Reporting Services Unleashed
The authoritative, example-rich guide to Microsoft’s powerful reporting platform
With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL... | | A Subject Guide to Quality Web Sites
The Web is always moving, always changing. As some Web sites come, others go, but the most effective sites have been well established. A Subject Guide to Quality Web Sites provides a list of key web sites in various disciplines that will assist researchers with a solid starting point for their queries. The sites included in this collection... | | Foundations of Computing
It may sound surprising that in computing, a field which develops so fast that the future often becomes the past without having been the present, there is nothing more stable and worthwhile learning than its foundations.
It may sound less surprising that in a field with such a revolutionary methodological impact on all sciences and... |
|
|
GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
The fourth edition of the International Conference on Geospatial Semantics
(GeoS 2011) was held in Brest, France, during May 12–13, 2011.
Geospatial semantics (GEOS) is an emerging research area in the domain of
geographic information science. It aims at exploring strategies, computational
methods, and tools to support... | | Concepts of Chemical Engineering 4 Chemists (RSC '4' Chemists)
This book is meant as a handbook and resource guide for chemists
(and other scientists) who either find themselves working alongside
chemical engineers or who are undertaking chemical engineering-type
projects and who wish to communicate with their colleagues and
understand chemical engineering principles. The book has arisen out
of... | | Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes... |
|
Municipal Solid Waste Incinerator Residues (Studies in Environmental Science)
The International Ash Working Group (IAWG) was established in 1989 to conduct an
in-depth review of the existing scientific data and develop a state-of-knowledge treatise
on MSW incinerator residue characterisation, disposal, treatment and utilisation. The
topics of operator and worker health and safety, and health risk assessment... | | Logic Pro X For Dummies (For Dummies (Computer/Tech))
Crank your sound up to X with Apple's premier recording software and Logic Pro X For Dummies!
Apple's Logic Pro X levels the playing field, making high-quality studio recordings accessible for any musician. It's a professional-level tool with a user-friendly interface and loads of new features to keep you... | | Learning Microsoft Windows Server 2012 Dynamic Access Control
When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.
Overview
-
Understand the advantages of using Dynamic Access Control and how it...
|
|
|
Result Page: 959 958 957 956 955 954 953 952 951 950 949 948 947 946 945 944 943 942 941 |