Home | Amazing | Today | Tags | Publishers | Years | Search 
Itanium Architecture for Programmers: Understanding 64-Bit Processors and EPIC Principles
Itanium Architecture for Programmers: Understanding 64-Bit Processors and EPIC Principles
  • Step-by-step guide to assembly language for the 64-bit Itanium processors, with extensive examples
  • Details of Explicitly Parallel Instruction Computing (EPIC): Instruction set, addressing, register stack engine, predication, I/O, procedure calls, floating-point operations, and more
  • Learn how to comprehend...
Microsoft .NET Kick Start
Microsoft .NET Kick Start

What is Microsoft .NET? Because this book is all about Microsoft .NET, it is important to first understand what.NET is. .NET is a technology platform for development and deployment of business applications using a set of technologies—.NET Framework, multiple programming languages, tools (particularly Visual Studio .NET),...

Virtualization: From the Desktop to the Enterprise (Books for Professionals by Professionals)
Virtualization: From the Desktop to the Enterprise (Books for Professionals by Professionals)

Creating a virtual network allows you to maximize the use of your servers. Virtualization: From the Desktop to the Enterprise is the first book of its kind to demonstrate how to manage all aspects of virtualization across an enterprise. (Other books focus only on singular aspects of virtualization, without delving into the...

Sams Teach Yourself ADO.NET in 24 Hours
Sams Teach Yourself ADO.NET in 24 Hours

ADO.NET is the data access model built into the .NET Framework. It replaces the old (and largely successful) ADO used in almost all Visual Basic and ASP applications built over the last few years. ADO.NET enables an application to communicate with any OLE database source (including Oracle, Sybase, Microsoft Access, and even text files). This...

CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition
CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition

Capability Maturity Model IntegrationSM (CMMI) has rapidly become a preferred means of improving organizational processes in industry and government. Building on a decade of work with process improvement models, including the Capability Maturity Model® (CMM®) for Software and the Systems Engineering Capability Model, a team of over two...

The Effective Incident Response Team
The Effective Incident Response Team

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...

Juniper Networks  Reference Guide: JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture

Juniper Networks(R) Reference Guide is the ideal implementation guide to the Juniper Networks(R) family of Internet routers and the network operating system JUNOS(TM). With concise explanations of internetworking theory and detailed examples, this book teaches readers how to configure,...

RFID+ Exam Cram (Exam Cram 2)
RFID+ Exam Cram (Exam Cram 2)
Studying for the new RFID+ exam? The RFID+ Certification Exam Cram is the perfect study companion. It features relevant Exam Notes that will help you score better on the exam, more than 300 exam prep questions, tips, acronyms, memory joggers, and the ever popular "Cram Sheet" tearcard, which...
XML, Web Services, and the Data Revolution (Technology Series)
XML, Web Services, and the Data Revolution (Technology Series)

"Frank Coyle's XML,Web Services, and the Data Revolution does a great job of explaining the XML phenomenon by clearly describing where it came from, why it has proved so useful, and where it is likely to take us."—Michael Champion

XML, Web Services, and the Data Revolution presents a...

Linux Kernels Internals (2nd Edition)
Linux Kernels Internals (2nd Edition)

Since the introduction of Linix version 1.2 in March 1995, a worldwide community has evolved from programmers who were attracted by the reliability and flexibility of this completely free operating system. Now at version 2.0, Linux is no longer simply the operating system of choice for hackers, but is being successfully employed in commercial...

Designing Data-Intensive Web Applications
Designing Data-Intensive Web Applications

The most prominent Web applications in use today are data-intensive. Scores of database management systems across the Internet access and maintain large amounts of structured data for e-commerce, on-line trading, banking, digital libraries, and other high-volume sites.

Developing and maintaining these data-intensive applications is...

The .NET and COM Interoperability Handbook
The .NET and COM Interoperability Handbook

.NET/COM interoperability in depth: comprehensive techniques and strategies

  • The most in-depth guide to .NET/COM interoperability ever published!
  • Covers every .NET/COM interop option, "gotcha," and workaround
  • Offers practical strategies for .NET migration and long-term .NET/COM...
Result Page: 536 535 534 533 532 531 530 529 528 527 526 525 524 523 522 521 520 519 518 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy