Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL: The Complete Reference, Second Edition
SQL: The Complete Reference, Second Edition
The Most Comprehensive SQL Resource Available

Get in-depth details on all the powerful features and capabilities of SQL inside this one-stop guide. Featuring broad coverage of every aspect of this leading database language, this book provides you with an overview of SQL then shows you how to retrieve and update data, program with SQL, use...

Macs All-in-One Desk Reference For Dummies (Computer/Tech)
Macs All-in-One Desk Reference For Dummies (Computer/Tech)
Welcome to the wonderful world of the Mac! Whether you’ve just decided to switch from Windows or you’ve been using a Mac for awhile and want to take advantage of all its bells and whistles, Macs All-in-One Desk Reference For Dummies is the perfect guidebook to Mac land.

You probably already know that Macs were made for...

Beginning SQL Server 2008 for Developers: From Novice to Professional
Beginning SQL Server 2008 for Developers: From Novice to Professional
SQL Server 2008 is a first–rate database management system. It offers more capability than any previous release of SQL Server. More than just a classic relational database management system, SQL Server 2008 includes exciting and powerful features that make it useful for everything from large corporate data warehouses to ad hoc departmental...
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however,...
How to Do Everything with Your Pocket PC and Handheld PC
How to Do Everything with Your Pocket PC and Handheld PC
Take full advantage of all the features your Pocket PC and Handheld PC have to offer with the help from this easy-to-follow guide. Wherever you go, stay up-to-date with your e-mail, appointments, to-do lists, and contact data. Connect to the Internet, create documents using the Pocket Office programs, share information with other handheld devices,...
Adobe AIR For Dummies (Computer/Tech)
Adobe AIR For Dummies (Computer/Tech)
Want to create rich Internet applications and RIA desktop apps that run seamlessly online and offline? Adobe AIR —Adobe Integrated Runtime — makes it possible; Adobe AIR For Dummies makes it easy.

AIR allows Web developers to create rich Internet applications using Web technologies. They run on desktops and across...

Cloud Computing, A Practical Approach
Cloud Computing, A Practical Approach

"The promise of cloud computing is here. These pages provide the 'eyes wide open' insights you need to transform your business." --Christopher Crowhurst, Vice President, Strategic Technology, Thomson Reuters

A Down-to-Earth Guide to Cloud Computing

Cloud Computing: A Practical Approach provides...

Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book...
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach

Analysis and Control of Boolean Networks presents a systematic new approach to the investigation of Boolean control networks. The fundamental tool in this approach is a novel matrix product called the semi-tensor product (STP). Using the STP, a logical function can be expressed as a conventional discrete-time linear system. In the light of...

VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)

Edward L. Haletky’s Complete, Solutions-Focused Guide to Running ESX Server 3.5, vSphere, and VMware 4.x

 

Extensively updated and revised, this is the definitive real-world guide to planning, deploying, and managing VMware ESX Server 3.5,...

Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores
Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores

Get up to speed on Cocoa and Objective-C, and start developing applications on the iOS and OS X platforms. If you don’t have experience with Apple’s developer tools, no problem! From object-oriented programming to storing app data in iCloud, the fourth edition of this book covers everything you need to build apps for the...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

unlimited object storage image
Result Page: 372 371 370 369 368 367 366 365 364 363 362 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy