Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Structured Query Language (SQL): a Practical Introduction
Structured Query Language (SQL): a Practical Introduction
Let's start from basics. What is a database? In very general terms, a database is a collection of related data. Notice the word related, this implies that the collection of letters on this page do not by themselves constitute a database. But if we think of them as a collection of letters arranged to form words, then they can be conceptualised as...
Microsoft BizTalk 2010: Line of Business Systems Integration
Microsoft BizTalk 2010: Line of Business Systems Integration

We know that it is rare in IT departments today that solutions do not have to integrate with other systems and even external entities. Systems just have to be connected to support the complex business processes and levels of automation that the business is demanding. Some of these systems are really at the core of the business. They can...

Come, Let's Play: Scenario-Based Programming Using LSCs and the Play-Engine
Come, Let's Play: Scenario-Based Programming Using LSCs and the Play-Engine
This book does not tell a story. Instead, it is about stories. Or rather, in technical terms, it is about scenarios. Scenarios of system behavior. It concentrates on reactive systems, be they software or hardware, or combined computer-embedded systems, including distributed and real-time systems.

We propose a
...
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

MintDuino: Building an Arduino-compatible Breadboard Microcontroller
MintDuino: Building an Arduino-compatible Breadboard Microcontroller
The MintDuino is deceiving—this little tin of electronics is capable of providing the brains for an unlimited number of devices limited only by your imagination… and, of course, your bank account.

While the MintDuino is certainly capable of being used during a moment of inspiration,
...
Platelets and Megakaryocytes: Volume 1: Functional Assays (Methods in Molecular Biology)
Platelets and Megakaryocytes: Volume 1: Functional Assays (Methods in Molecular Biology)

12 The average human body has in the order of 10 circulating platelets. They are crucial for hemostasis, and yet excessive platelet activation is a major cause of m- bidity and mortality in western societies. It is therefore not surprising that platelets have become one of the most extensively investigated biological cell types. We are,...

IBM Cognos 8 Planning
IBM Cognos 8 Planning
Business planning is no longer just about defining goals, identifying critical issues, and then mapping out strategies. In today's dynamic and highly competitive business environment, companies with complex business models want their abstract strategies turned into discrete, executable plans. They want information from the field to reach decision...
Expert Oracle Database Architecture: Oracle Database Programming 9i, 10g, and 11g Techniques and Solutions, Second Edition
Expert Oracle Database Architecture: Oracle Database Programming 9i, 10g, and 11g Techniques and Solutions, Second Edition

Now in its second edition, this best-selling book by Tom Kyte of Ask Tom fame continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom has a simple philosophy: you can treat Oracle as a black box and just stick data into...

Windows 2000(r) Active Directory Survival Guide: Planning and Implementation
Windows 2000(r) Active Directory Survival Guide: Planning and Implementation
The biggest challenge and opportunity for IS departments approaching Windows 2000 is probably Active Directory (AD), which can reduce total cost of ownership (TCO) and simplify administration. For any IS professional or administrator, Windows 2000 Active Directory Survival Guide provides both a high-level introduction and a hands-on guide...
Algorithms in a Nutshell (O'Reilly)
Algorithms in a Nutshell (O'Reilly)
Creating robust software requires the use of efficient algorithms, but programmers seldom think about them until a problem occurs. Algorithms in a Nutshell describes a large number of existing algorithms for solving a variety of problems, and helps you select and implement the right algorithm for your needs -- with just enough math to let...
10 Cool LEGO Mindstorms: Dark Side Robots, Transports, and Creatures: Amazing Projects You Can Build in Under an Hour
10 Cool LEGO Mindstorms: Dark Side Robots, Transports, and Creatures: Amazing Projects You Can Build in Under an Hour

LEGO MINDSTORMS let you design and program robots that can do just about anything!

The Dark Side Developer's Kit is targeted towards the young or novice LEGO MINDSTORMS designer, age 9 and up, although experienced MINDSTORMS fans will appreciate the unique possibilities offered by this kit as well. The Dark Side Developer's...

unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy