Home | Amazing | Today | Tags | Publishers | Years | Search 
The SGML FAQ Book : Understanding the Foundation of HTML and XML (Electronic Publishing Series)
The SGML FAQ Book : Understanding the Foundation of HTML and XML (Electronic Publishing Series)
The SGML FAQ Book: Understanding the Foundation of HTML and XML is similar, but not quite the same kind of thing as an online FAQ or `Frequently Asked Questions' list. It addresses questions from people who already actually use SGML in some way (including HTML authors), and people who are about to use it. It deals mainly with issues...
Implementing ITIL Configuration Management
Implementing ITIL Configuration Management
Practical, Real-World ITIL Configuration Management–From Start to Finish

 

The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,...

jQuery in Action
jQuery in Action

A good web development framework anticipates what you need to do and makes those tasks easier and more efficient; jQuery practically reads your mind. Developers of every stripe-hobbyists and professionals alike-fall in love with jQuery the minute they've reduced 20 lines of clunky JavaScript into three lines of elegant, readable code. This new,...

Maple and Mathematica: A Problem Solving Approach for Mathematics
Maple and Mathematica: A Problem Solving Approach for Mathematics
This book compares the two computer algebra programs, Maple and Mathematica used by students, mathematicians, scientists, and engineers.

Structured by presenting both systems in parallel, Mathematicas users can learn Maple quickly by finding the Maple equivalent to Mathematica functions, and vice versa.

This student reference handbook...

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Introduction to Assembly Language Programming: For Pentium and RISC Processors (Texts in Computer Science)
Introduction to Assembly Language Programming: For Pentium and RISC Processors (Texts in Computer Science)
Assembly language continues to hold a core position in the programming world because of its similar structure to machine language and its very close links to underlying computer-processor architecture and design. These features allow for high processing speed, low memory demands, and the capacity to act directly on the system's hardware. This...
Learning Python, 3rd Edition
Learning Python, 3rd Edition

Portable, powerful, and a breeze to use, Python is ideal for both standalone programs and scripting applications. With this hands-on book, you can master the fundamentals of the core Python language quickly and efficiently, whether you're new to programming or just new to Python. Once you finish, you will know enough about the language to...

Pediatric Critical Care Medicine (Slonim)
Pediatric Critical Care Medicine (Slonim)
Presenting comprehensive and well-integrated coverage of physiology, pathophysiology, and clinical problems, Pediatric Critical Care Medicine is a core textbook and clinical reference for pediatric intensivists at all levels of training. It offers thorough preparation for subspecialty certification and recertification examinations and provides a...
Accessible Access 2003
Accessible Access 2003
Our first book on Access was entitled Accessible Access 2000. Given that this one is all about Access 2003, we clearly had to change the title. As soon as you change the title of a book, you get a new ISBN and technically it’s a new book. However, since the original book seemed to be popular with its readers, we didn’t want to change a...
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as...
A Programmer's Guide to Java (tm) Certification
A Programmer's Guide to Java (tm) Certification
"We have written A Programmer’s Guide to Java Certification to allow the reader to master the Java programming language. Mastering the language should naturally culminate in the practical goal of passing the Sun Certified Programmer for Java‘ 2 Platform exam. In addition to preparing the reader thoroughly for the exam, this...
Ruby Pocket Reference
Ruby Pocket Reference
Although Ruby is an easy language to learn, in the heat of action you may find that you can't remember the correct syntax for a conditional or the name of a method. This handy pocket reference offers brief yet clear explanations of Ruby's core components, from operators to reserved words to data structures to method syntax, highlighting those key...
Result Page: 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 272 271 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy