Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional Ajax (Programmer to Programmer)
Professional Ajax (Programmer to Programmer)
Combining tried-and-true CSS, XML, and JavaScript™ technologies, Ajax provides web developers with the ability to create more sophisticated and responsive user interfaces and break free from the "click-and-wait" standard that has dominated the web since its introduction.

This book discusses the range of request brokers...

Implementing CIFS: The Common Internet File System
Implementing CIFS: The Common Internet File System

"The book that Microsoft should have written, but didn't."
—Jeremy Allison, Samba Team

"Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read."
—J.D. Lindemann, network engineer, Adaptec, Inc.

The...

Managing NFS and NIS, 2nd Edition
Managing NFS and NIS, 2nd Edition
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.
Managing NFS and NIS, in a new edition based on Solaris 8,
...
A Manager's Guide To PR Projects: A Practical Approach (LEA's Communication Series)
A Manager's Guide To PR Projects: A Practical Approach (LEA's Communication Series)
A Manager s Guide to PR Projects was conceived, gestated, and produced
out of sheer frustration. Perhaps a more academic approach to this explanation
would be to say that one university professor experienced considerable
difficulty in acquiring appropriate materials to support a pedagogical approach
involving student
...
A Tester's Guide to .NET Programming
A Tester's Guide to .NET Programming
Today’s software testing environment has changed. A common trend we are seeing these days is
advertisements for software developers and testers that look virtually the same. Today, companies
all seem to require software test professionals with in-depth knowledge of programming languages
and with significant database skills.
...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Linux Applications on Pseries
Linux Applications on Pseries
The strengths of the AIX operating system are well known among in the UNIX software community. Its reliability and great degree of scaling make AIX the perfect choice for hosting mission-critical applications. It is a robust and flexible operating system that meets all the requirements for the various demands of e-business environments. At the same...
Hybrid Architectures for Intelligent Systems
Hybrid Architectures for Intelligent Systems

The interaction between Fuzzy Set theory and Neural Network theory is multi-faceted and occurs at many different levels. The connection between these two concepts occurs both in the framework of real and artificial neural systems.

The brain is not just a collection of neurons grouped together at some part of the animal’s body,...

UMTS and Mobile Computing
UMTS and Mobile Computing
This unique book bridges the gap between ubiquitous computing (UBICOMP) and third generation mobile communication. A first-of-its-kind, this resource helps you decide which are the most promising technologies to use for specific mobile communication applications. Scenarios indicate how new applications will be developed and how to implement them....
Maya 8 Character Modeling (Wordware Applications Library)
Maya 8 Character Modeling (Wordware Applications Library)
This Maya modeling book is unique in its approach to modeling a high-resolution character model. Where other books take a grueling approach that often leaves readers confused, Maya 8 Character Modeling breaks down the character into an easy-to-follow formula. Readers learn that modeling a character can be accomplished without the fear of being in...
Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
The Modern Invention of Information: Discourse, History, and Power
The Modern Invention of Information: Discourse, History, and Power
If we look in the Oxford English Dictionary under the term “information,” we will be struck by the impression that its use as a substantive, as a synonym for fact or for knowledge, is relatively new. Until very recently, “information” had the sense of imparting knowledge (in the sense of telling someone something) or of...
unlimited object storage image
Result Page: 820 819 818 817 816 815 814 813 812 811 810 809 808 807 806 805 804 803 802 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy