Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ADO.NET 3.5 Cookbook
ADO.NET 3.5 Cookbook

This guide is strikingly different from other books on Microsoft ADO.NET. Rather than load you down with theory, the new edition of ADO.NET 3.5 Cookbook gives you more than 200 coding solutions and best practices for real problems you're likely to face with this technology using Visual Studio...

Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
The Relational Model for Database Management: Version 2
The Relational Model for Database Management: Version 2
Today, if you have a well-designed database management system, you have the keys to the kingdom of data processing and decision support. That is why there now exists a prototype machine whose complete design is based on the relational model. Its arithmetic hardware is a quite minor part of thearchitecture. In fact, the old term "computer...
Global Nonlinear Dynamics for Engineering Design and System Safety (CISM International Centre for Mechanical Sciences (588))
Global Nonlinear Dynamics for Engineering Design and System Safety (CISM International Centre for Mechanical Sciences (588))
This is the first book which exploits concepts and tools of global nonlinear dynamics for bridging the gap between theoretical and practical stability of systems/structures, and for possibly enhancing the engineering design in macro-, micro- and nano-mechanics. Addressed topics include complementing theoretical and practical stability to achieve...
Developing Time-Oriented Database Applications in SQL
Developing Time-Oriented Database Applications in SQL
What is everywhere but occupies no space; can be measured but not seen or touched; can be spent, wasted, or killed, but not destroyed or changed? The simple answer is time, and the relationship between the fourth dimension and data is the foundation for Developing Time-Oriented Database Applications in SQL, a fascinating book by Richard T....
Windows File System Troubleshooting
Windows File System Troubleshooting

The Windows file system is large and complex, featuring not only a huge number of essential files and folders for the Windows OS, your software and hardware, but also several different underlying file systems that manage and maintain file integrity on your disks. In this book you’ll learn how to navigate around the Windows file...

Signal Integrity and Radiated Emission of High-Speed Digital Systems
Signal Integrity and Radiated Emission of High-Speed Digital Systems

Before putting digital systems for information technology or telecommunication applications on the market, an essential requirement is to perform tests in order to comply with the limits of radiated emission imposed by the standards.

This book provides an investigation into signal integrity (SI) and electromagnetic interference...

The Art of Investigative Interviewing, Third Edition
The Art of Investigative Interviewing, Third Edition

The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative interviewing, such as human psychology, proper interview preparation,...

Database Systems: Design, Implementation, and Management
Database Systems: Design, Implementation, and Management

For many reasons, few books survive to reach their eighth edition. Authors and publishers who let the success of their earlier work produce the comfort of complacency usually pay the price of watching the marketplace dismantle their creations. This database systems book has been successful through seven editions because we–the...

Semiconductor Modeling:: For Simulating Signal, Power, and Electromagnetic Integrity
Semiconductor Modeling:: For Simulating Signal, Power, and Electromagnetic Integrity

Semiconductor Modeling: For Simulating Signal, Power, and Electromagnetic Integrity assists engineers – both recent graduates and working product designers – in designing high-speed circuits. The authors apply circuit theory, circuit simulation tools, and practical experience to help the engineer...

Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
Self-Constitution: Agency, Identity, and Integrity
Self-Constitution: Agency, Identity, and Integrity
Christine M. Korsgaard presents an account of the foundation of practical reason and moral obligation. Moral philosophy aspires to understand the fact that human actions, unlike the actions of the other animals, can be morally good or bad, right or wrong. Few moral philosophers, however, have exploited the idea that actions might be morally good or...
unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy