Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inside Microsoft SQL Server 2000
Inside Microsoft SQL Server 2000
This newly updated, official guide to the core architecture and internals of Microsoft SQL Server 2000 helps readers unlock the full power of Microsoft's premier relational database management system. Written by a renowned SQL Server guru, in conjunction with the Microsoft SQL Server 2000 product development team, INSIDE MICROSOFT SQL SERVER 2000...
Metaprogramming Elixir: Write Less Code, Get More Done (and Have Fun!)
Metaprogramming Elixir: Write Less Code, Get More Done (and Have Fun!)

Write code that writes code with Elixir macros. Macros make metaprogramming possible and define the language itself. In this book, you'll learn how to use macros to extend the language with fast, maintainable code and share functionality in ways you never thought possible. You'll discover how to extend Elixir with your own first-class...

Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Inside Microsoft SQL Server 2005: T-SQL Querying
Inside Microsoft SQL Server 2005: T-SQL Querying
A comprehensive, hands-on reference for database developers and administrators, this book focuses on advanced querying techniques using Transact-SQL (T-SQL), the database programming language built into SQL Server. Includes code and table examples.

Key Book Benefits:
  • Delivers practical, hands-on guidance on...
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications

Recipe-based approach to tackle the most common problems in Computer Vision by leveraging the functionality of OpenCV using Python APIs

Key Features

  • Build computer vision applications with OpenCV functionality via Python API
  • Get to grips with image processing, multiple...
The Accredited Symbian Developer Primer: Fundamentals of Symbian OS (Symbian Press)
The Accredited Symbian Developer Primer: Fundamentals of Symbian OS (Symbian Press)
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know.

The Primer explains the knowledge tested in the Accredited Symbian Developer exam, identifying and explaining the topics examined. Each of the exam's objectives is succinctly...

ASP.NET in 60 Minutes a Day
ASP.NET in 60 Minutes a Day
Get up and running with ASP.NET using this innovative virtual classroom approach!

Are you ready to learn how to write clean, reusable, scalable code for Web pages using ASP.NET? Experienced trainer Glenn Johnson takes you inside his virtual classroom to provide you with seventeen one-hour lessons that recreate a typical introductory seminar on...

Inside Microsoft® SQL Server(TM) 2005: Query Tuning and Optimization
Inside Microsoft® SQL Server(TM) 2005: Query Tuning and Optimization
Dive deep into the internals of query tuning and optimization in SQL Server 2005 with this comprehensive reference. Understanding the internals of SQL Server helps database developers and administrators to better create, access, and effectively process information from enterprise data. Written by experts on SQL Server, this volume from the Inside...
The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
Learn and master the new features in the JSF 2.3 MVC web framework in this definitive guide written by two of the JavaServer Faces (JSF) specification leads. The authors take you through real-world examples that demonstrate how these new features are used with other APIs in Java EE 8. You’ll see the new and exciting ways...
Implementing CIFS: The Common Internet File System
Implementing CIFS: The Common Internet File System

"The book that Microsoft should have written, but didn't."
—Jeremy Allison, Samba Team

"Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read."
—J.D. Lindemann, network engineer, Adaptec, Inc.

The...

Understanding Linux Network Internals
Understanding Linux Network Internals

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy