Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional SharePoint 2007 Development (Programmer to Programmer)
Professional SharePoint 2007 Development (Programmer to Programmer)
If you're a .NET or Microsoft Office developer, this book gives you the tools to utilize the entire SharePoint platform. It offers practical insights that will help you take advantage of this integrated suite of server capabilities along with specific examples of how to implement classes of solutions on top of the platform. You'll be able to apply...
Beginning XNA 3.0 Game Programming: From Novice to Professional (Beginning from Novice to Professional)
Beginning XNA 3.0 Game Programming: From Novice to Professional (Beginning from Novice to Professional)
It’s hard to believe the runaway popularity XNA has achieved in the short period of time since it was released in late 2006. At that time, I got together with a couple friends to check out (with some trepidation, I must confess) whether games really could be written in managed code.

We were very excited, and everyone wanted to know
...
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
The Innovation Handbook: How to Profit from Your Ideas, Intellectual Property and Market Knowledge
The Innovation Handbook: How to Profit from Your Ideas, Intellectual Property and Market Knowledge


Unique features, distinctive capabilities and exclusive know-how are the surest way to stay ahead of the market for any length of time. But the way these points of difference are created and commercialized is changing. The difficulty for most organizations is not in generating ideas, but in pursuing the right one at the
...

Succeeding with Open Source
Succeeding with Open Source
Much like Odysseus—who had to negotiate perils between Scylla and Charybdis—IT managers face daunting challenges. On one side, there is relentless pressure to cut costs. On the other lies an unending demand for innovative solutions. However, unlike Odysseus, IT managers must not simply avoid either fate: Instead, they must fulfill both...
Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...

Switching to the Mac: The Missing Manual, Tiger Edition
Switching to the Mac: The Missing Manual, Tiger Edition

It's little wonder that longtime Windows users are migrating in droves to the new Mac. They're fed up with the virus-prone Windows way of life, and they're lured by Apple's well-deserved reputation for producing great all-around computers that are reliable, user-friendly, well designed, and now--with the $500 Mac mini--extremely...

Modernity and Technology
Modernity and Technology
Review
"An interesting and well-integrated collection..." -- Peter Beech, First Monday

Reconstruction (2004 4#2)
Modernity and Technology succeeds in opening up a much needed dialog, and in inspiring curiosity for scholars on both sides.
...
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
iText in Action
iText in Action

With iText, one can transform PDF documents into live, interactive applications quickly and easily. This free and open source library for Java and .NET is the leading tool of its kind, and was primarily developed and maintained by Bruno Lowagie, the author of this book.

iText in Action, Second Edition offers an...

Extreme Programming and Agile Methods - XP/Agile Universe 2004: 4th Conference on Extreme Programming and Agile Methods, Calgary, Canada, August
Extreme Programming and Agile Methods - XP/Agile Universe 2004: 4th Conference on Extreme Programming and Agile Methods, Calgary, Canada, August
It was 1999 when Extreme Programming Explained was first published, making this year’s event arguably the fifth anniversary of the birth of the XP/Agile movement in software development. Our fourth conference reflected the evolution and the learning that have occurred in these exciting five years as agile practices have become...
The 10 Immutable Laws of Power Selling: The Key to Winning Sales, Wowing Customers, and Driving Profits Through the Roof
The 10 Immutable Laws of Power Selling: The Key to Winning Sales, Wowing Customers, and Driving Profits Through the Roof

Don’t just watch them—join them! Become a member of that elite group of sales pros who consistently break records in every selling environment. The 10 Immutable Laws of Power Selling reveals the secrets of the world’s greatest power sellers and shows you how to set some records of your own.

With case...

unlimited object storage image
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy