 |
|
 .NET Performance Testing and Optimization - The Complete Guide
There is a huge amount of information available on the how's and why's of performance testing .NET applications, but it is often fairly subjective, narrow in scope, or doesn't quite cover everything you were hoping to learn. The Complete Guide to Performance Testing and Optimizing .NET Applications (by Paul Glavich and Chris... |  |  Guide to UNIX Using Linux (Networking)
Guide to UNIX Using Linux, Fourth Edition is updated to include new UNIX/Linux distributions,
networking utilities, new UNIX/Linux capabilities, and coverage of both the
GNOME and KDE desktops.The large array of commands, utilities, file systems, and other
information you learn here applies to any Linux system and most UNIX... |  |  A Comparative Study of Very Large Data Bases (Lecture Notes in Computer Science)
This monograph presents a comparison of methods for organizing very large amounts of stored data called a very large database to facilitate fast retrieval of desired information on direct access storage devices. In a very large data base involving retrieval and updating, the major factor of immediate concern is the average number of accesses... |
|
|
 Flash Development for Android Cookbook
It's taken a few years, but mobile and devices are finally hot. How hot? Like biting into a
freshly ripe, raw, Habanero chili kind-a-HOT. Can you taste the virtual heat on your virtual
tongue yet?
Yowza! The point I'm trying to get across is this. The broader mobile and device industry
has finally gone mainstream. Why... |  |  America's Most Wanted Recipes - Volume 2
Discover the secret recipes for your favorite restaurant dishes and learn how to make them yourself. This cookbook will teach you the jealously guarded secrets behind actual dishes from billion dollar restaurants - The Cheesecake Factory, KFC, The Olive Garden, PF Chang's, Red Lobster, Hard Rock Cafe... (far too many to list here) and... |  |  Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new ... |
|
 LEGO MINDSTORMS NXT: Mars Base Command (Technology in Action)
Congratulations! You’re on Mars Base Alpha, the first human outpost on the red planet. Don’t relax, though. It’s not all roses and unicorns up here. Mars isn’t called "The Bringer of War" for nothing! You’ve just been rained on by a meteor shower and it’s up to you—you!—to put your... |  |  Data Structures and Algorithm Analysis in C (2nd Edition)
This book describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more careful attention... |  |  The Book of Revelation (For Dummies)
Acommon cartoon theme involves a person wearing a sandwich sign or carrying a poster that proclaims, “Repent! The end is near!” What’s implied is that some sudden, violent event is just around the corner and that people need to brace themselves for whatever’s coming. And usually, the end that’s near involves... |
|
| Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |