Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft  Excel Version 2002 Inside Out
Microsoft Excel Version 2002 Inside Out
Sometimes new versions of software just don't seem compelling enough for you to take the upgrade plunge. You wonder how many more big leaps can really be made in usability and functionality. Microsoft Excel has certainly evolved into a "mature" program. Nonetheless, this release is much more than cosmetic. Microsoft Excel 2002...
Next Generation Geospatial Information: From Digital Image Analysis to Spatiotemporal Databases (ISPRS Book Series)
Next Generation Geospatial Information: From Digital Image Analysis to Spatiotemporal Databases (ISPRS Book Series)

With the turn of the century our ability to collect and store geospatial information has increased considerably. This has resulted in ever-increasing amounts of heterogeneous geospatial data, an issue that poses new challenges and opportunities. As these rich sources of data are made available, users rely, now more than ever, on the...

Enterprise Security with EJB and CORBA(r)
Enterprise Security with EJB and CORBA(r)
"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."–Wing K. Lee, Sprint

Enterprise Security with EJB and CORBA

With e-business and distributed components comes the need for a bold new approach to...

Linguistic Modeling of Information and Markup Languages: Contributions to Language Technology
Linguistic Modeling of Information and Markup Languages: Contributions to Language Technology

This book addresses the interests of a large community of researchers in the fields of XML-based annotation techniques and corpus-based language technology. It covers the most significant recent developments in this field, from multi-layered mark-up and standards to theoretical formalisms to applications. The contributions are based on research...

Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth® wireless technology is a short-range radio standard that provides new opportunities for wireless devices. This radio standard was designed originally as a way of eliminating the cables currently attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized...
Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
Java and XSLT (O'Reilly Java)
Java and XSLT (O'Reilly Java)
Java and Extensible Stylesheet Language Transformations (XSLT) are very different
technologies that complement one another, rather than compete. Java's strengths are portability,
its vast collection of standard libraries, and widespread acceptance by most companies. One
weakness of Java, however, is in its ability to process text.
...
Scripting in Java: Languages, Frameworks, and Patterns
Scripting in Java: Languages, Frameworks, and Patterns

Java is an excellent object-oriented programming language. It has provided many benefits to software developers, including a good object-oriented approach, implicit memory management, and dynamic linking, among others. These language characteristics are one of the main reasons for Java’s popularity and wide acceptance.

...

Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution
Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution

The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information systems running today in many organizations were developed many years ago with technologies that are now obsolete. These old systems, known as legacy...

Applied Ontology Engineering in Cloud Services, Networks and Management Systems
Applied Ontology Engineering in Cloud Services, Networks and Management Systems

Metadata standards in today’s ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering...

Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
Monitoring and Managing Microsoft Exchange 2000 Server (HP Technologies)
Monitoring and Managing Microsoft Exchange 2000 Server (HP Technologies)

Monitoring and Managing Microsoft Exchange 2000 Server focuses on what to do after Exchange has been deployed—how to design and implement the support infrastructure, how to monitor and manage messaging traffic, and how to avoid disaster through proactive planning and management. ...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy