Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NET
Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NET
Learn how to turn data into solutions with SQL Server 2000, Visual Basic .NET, and XML. Get a fundamental grasp of SQL Server 2000 data access, data manipulation, and data definition T-SQL programming techniques, Visual Basic .NET language enhancements, Microsoft Visual Studio .NET integrated development environment advances, and the...
Professional Java, JDK 5 Edition
Professional Java, JDK 5 Edition
Java continues to be the dominant language for building server applications, and the latest update to the Java platform—JDK 5—boasts many new features, including a metadata facility, generics, autoboxing, and improved user interface performance. Building upon Ivor Horton's Beginning Java, this book provides insight into these...
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Business Services Orchestration: The Hypertier of Information Technology
Business Services Orchestration: The Hypertier of Information Technology

Business Services Orchestration (BSO) is a new, unique, far-reaching industry technology encompassing the art of harmoniously organizing the interactions between business services. These business services may represent internal business processes of organizations. Integration of many of these internal legacy, custom, and COTS applications may,...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Click: What Millions of People Are Doing Online and Why it Matters
Click: What Millions of People Are Doing Online and Why it Matters

What time of year do teenage girls search for prom dresses online? How does the quick adoption of technology affect business success (and how is that related to corn farmers in Iowa)? How do time and money affect the gender of visitors to online dating sites? And how is the Internet itself affecting the way we experience the world? In...

Concentrator Photovoltaics (Springer Series in Optical Sciences)
Concentrator Photovoltaics (Springer Series in Optical Sciences)
Photovoltaic solar-energy conversion is one of the most promising technologies for generating renewable energy, and conversion of concentrated sunlight can lead to reduced cost for solar electricity. In fact, photovoltaic conversion of concentrated sunlight insures an efficient and cost-effective sustainable power resource. This book gives an...
Exporting Essentials: Selling Products and Services to the World Successfully
Exporting Essentials: Selling Products and Services to the World Successfully

Exporting Essentials: Selling Products and Services to the World Successfully is for entrepreneurs and small business owners—the makers, movers, and shakers in our world—interested in taking their businesses to the next level of growth through exports. This short, hard-hitting book covers just the essentials,...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Software by Design: Shaping Technology and The Workplace
Software by Design: Shaping Technology and The Workplace
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace. This book provides an informative, cogent examination of how various social factors--such as organizational structure, workplace relations, and market...
Data Mining with R: Learning with Case Studies
Data Mining with R: Learning with Case Studies

The versatile capabilities and large set of add-on packages make R an excellent alternative to many existing and often expensive data mining tools. Exploring this area from the perspective of a practitioner, Data Mining with R: Learning with Case Studies uses practical examples to illustrate the power of R and data...

unlimited object storage image
Result Page: 197 196 195 194 193 192 191 190 189 188 187 186 185 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy