Home | Amazing | Today | Tags | Publishers | Years | Search 
GDI+ Custom Controls with Visual C# 2005
GDI+ Custom Controls with Visual C# 2005
The amount of built-in functionality included in the .NET Framework is amazing. One could create complex applications with lots of functionality by simply assembling the pieces you're offered for free. Among those pieces you'll find lots of powerful, flexible, and configurable controls. Who would ever need to build their own controls, right?...
The Unauthorized Halo 2 Battle Guide: Advanced Combat Techniques
The Unauthorized Halo 2 Battle Guide: Advanced Combat Techniques
Contents of this Battle Guide
This Battle Guide is designed to give you an edge by enabling you to learn about and master techniques and strategies organized by specific topics. This enables you to jump around and get the information you want when you want it. You
...
Java Development with Ant
Java Development with Ant
This book is about Ant, the award-winning Java build tool. Ant has become the centerpiece of so many projects’ build processes because it is easy to use, is platform independent, and addresses the needs of today’s projects to automate testing and deployment. From its beginnings as a helper application to compile Tomcat, Sun’s (now...
Network Control and Engineering for QOS, Security and Mobility, III
Network Control and Engineering for QOS, Security and Mobility, III
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con’2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and...
Software Project Secrets: Why Software Projects Fail
Software Project Secrets: Why Software Projects Fail
Previously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the...
Pro SQL Server 2005 Database Design and Optimization
Pro SQL Server 2005 Database Design and Optimization

Pro SQL Server 2005 Database Design and Optimization will teach you effective strategies for designing proper databases. It covers everything from how to gather business requirements to logical data modeling and normalization. It then shows you how to implement your design on SQL Server 2005.

The authors also describe how to...

Multimedia Messaging Service: An Engineering Approach to MMS
Multimedia Messaging Service: An Engineering Approach to MMS
The Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for...
Sams Teach Yourself J2EE in 21 Days
Sams Teach Yourself J2EE in 21 Days

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

Fuzzy Databases: Modeling, Design And Implementation
Fuzzy Databases: Modeling, Design And Implementation
Fuzzy Databases: Modeling, Design and Implementation focuses on some semantic aspects which have not been studied in previous works and extends the EER model with fuzzy capabilities. The exposed model is called FuzzyEER model, and some of the studied extensions are: fuzzy attributes, fuzzy aggregations and different aspects on specializations, such...
Incident Response: Computer Forensics Toolkit
Incident Response: Computer Forensics Toolkit
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer...

Nature's Keepers: The Remarkable Story of How the Nature Conservancy Became the Largest Environmental Group in the World
Nature's Keepers: The Remarkable Story of How the Nature Conservancy Became the Largest Environmental Group in the World
Learn the Management and Leadership Lessons of the World's Largest Environmental Organization

"Nature's Keepers is a remarkable book about a remarkable organization—and a ripping yarn about groups and people who make a difference against all odds. Beyond that, it is a matchless tale of a half-century of organizational growth and...

Advanced Animation with DirectX
Advanced Animation with DirectX
Welcome to Advanced Animation with DirectX® ! This book is your guide to getting past the basics of DirectX graphics and into the bigger world of advanced animation! Take the information you already know and learn how to expand it into a vast array of various eyepopping graphical effects.

Keep
...
Result Page: 187 186 185 184 183 182 181 180 179 178 177 176 175 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy