 |
|
 Microsoft .NET for Visual FoxPro DevelopersI asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.
Then, I started to dive into the .NET... |  |  Topics in Geometry, Coding Theory and Cryptography (Algebra and Applications)The purpose of this reviewarticle is to serve as an introduction and at the same time, as an invitation to the theory of towers of function fields over finite fields. More specifically, we treat here the case of explicit towers; i.e., towers where the function fields are given by explicit equations. The asymptotic behaviour of the genus and of the... |  |  Dreamweaver MX 2004 in 10 Steps or LessIf you are looking to make your job of building Web pages as effortless as possible and need a quick and easy understanding of the technology in order to do so, then this book is for you-whether you're new to Dreamweaver MX 2004 or you need a refresher on everything from simple tasks such as defining a Dreamweaver MX 2004 site to complex tasks such... |
|
 |  |  Security for Wireless Ad Hoc NetworksWireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... |  |  High Performance Data Mining - Scaling Algorithms, Applications and SystemsThis special issue of Data Mining and Knowledge Discovery addresses the issue of scaling data mining algorithms, applications and systems to massive data sets by applying high performance computing technology. With the commoditization of high performance computing using clusters of workstations and related technologies, it is becoming more and more... |
|
 Information Security and Ethics: Social and Organizational IssuesInformation Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student... |  |  PowerPoint 2007 Just the Steps For DummiesWhen you’re trying to harness the power of PowerPoint, you don’t want to wade through lots of background and definitions; you want to make things happen! Power Point Just the Steps for Dummies puts your hands and eyes to work immediately so you can finish any PowerPoint project in a flash.Ð Just choose your task,... |  |  Transformation of Knowledge, Information and Data: Theory and ApplicationsTransformation of Knowledge, Information and Data: Theory and Applications considers transformations within the context of computing science and information science, as they are essential in changing organizations.
Data today is in motion, going from one location to another. It is more and more moving between systems, system components,... |
|
|
Result Page: 1184 1183 1182 1181 1180 1179 1178 1177 1176 1175 1174 1173 1172 1171 1170 1169 1168 1167 1166 |