|
|
|
|
Professional C# 2012 and .NET 4.5
Intermediate to advanced technique coverage, updated for C# 2012 and .NET 4.5
This guide is geared towards experienced programmers looking to update and enhance their skills in writing Windows applications, web apps, and Metro apps with C# and .NET 4.5. Packed with information about intermediate and advanced features, this... | | | | Yahoo! HacksYahoo! took the world by storm in the 1990s as a one-of-a-kind, searchable list of interesting web sites. But ten years later, it has expanded into a department store overflowing with useful and innovative tools and services-from email, blogging, social networking, and instant messaging, to news, financial markets, shopping,... |
|
Data Mining with Microsoft SQL Server 2008The most authoritative book on data mining with SQL Server 2008
SQL Server Data Mining has become the most widely deployed data mining server in the industry. Business users—and even academic and scientific users—have adopted SQL Server data mining because of its scalability, availability, extensive functionality, and ease of... | | Introduction to Search Engine Optimization: A Guide for Absolute Beginners
Don't be intimidated by all the search engine optimization (SEO) tools out there. You will start out learning about keywords and the importance of quality content and then walk through incremental steps as you try out the tools and master the tips and strategies. If you are completely new to search engine optimization and you want ... | | Website Optimization: Speed, Search Engine & Conversion Rate SecretsRemember when an optimized website was one that merely didn't take all day to appear? Times have changed. Today, website optimization can spell the difference between enterprise success and failure, and it takes a lot more know-how to achieve success.
This book is a comprehensive guide to the tips, techniques, secrets, standards, and methods... |
|
|
Incident Response: Computer Forensics ToolkitYour in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks
Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer... | | Professional Visual Basic 2012 and .NET 4.5 Programming
Explore Visual Basic 2012 and .NET 4.5 with this fully updated resource
After a quick review of the of introductory topics of Visual Basic 2012 and .NET 4.5, this book moves quickly into advanced topics such as data access with ADO.NET, security, ASP.NET web programming with Visual Basic, Windows workflow, and threading.... | | MySQL in a NutshellWhen you need to find the right SQL keyword or MySQL client command-line option right away, turn to this convenient reference, known for the same speed and flexibility as the system it covers so thoroughly. MySQL is packed with so many capabilities that the odds of remembering a particular function or statement at the right moment are pretty slim.... |
|
|
Result Page: 6 5 4 3 2 1 |