Home | Amazing | Today | Tags | Publishers | Years | Search 
Creating Lightweight Components with ATL
Creating Lightweight Components with ATL
Creating Lightweight Components with ATL covers ATL in depth, including an overview of COM development, then drills down to explain how ATL implements the fundamentals of COM. It also details how small, lightweight ATL-based COM solutions can be created to solve 'real world' problems. Creating Lightweight Controls with ATL enables you to quickly...
Building Web Applications with ADO.NET and XML Web Services (Gearhead Press--In the Trenches)
Building Web Applications with ADO.NET and XML Web Services (Gearhead Press--In the Trenches)
In 1998, Microsoft submitted a draft specification of what would later be named the SOAP protocol. XML 1.0 had only just become a full recommendation. Given that the contributors worked on the COM and MTS teams, it was no wonder that Microsoft initially wanted this new protocol to support its Windows DNA 2000 solution. It would be only a matter of...
Fedora Linux Toolbox: 1000+ Commands for Fedora, CentOS and Red Hat Power Users
Fedora Linux Toolbox: 1000+ Commands for Fedora, CentOS and Red Hat Power Users

Explore a ton of powerful Fedora Linux commands

This handy, compact guide teaches you to use Fedora Linux as the experts do: from the command line. Try out over 1000 commands to find and get software, monitor system health and security, and access network resources. Apply skills you learn from this book to use and...

Progress in Pattern Recognition, Image Analysis and Applications: 12th Iberoamerican Congress on Pattern Recognition, CIARP 2007,Valpariso
Progress in Pattern Recognition, Image Analysis and Applications: 12th Iberoamerican Congress on Pattern Recognition, CIARP 2007,Valpariso
These proceedings offer a written account of the scientific contributions presented at the 12th Iberoamerican Congress on Pattern Recognition (CIARP 2007), held in Vi˜na del Mar-Valpara´ıso, Chile. The aim of the congress was to promote and disseminate ongoing research and mathematical methods for pattern recognition, image...
Network Management: Accounting and Performance Strategies
Network Management: Accounting and Performance Strategies
Understanding network performance and effectiveness is now crucial to business success. To ensure user satisfaction, both service providers and enterprise IT teams must provide service-level agreements (SLA) to the users of their networks–and then consistently deliver on those commitments. Now, two of the Cisco® leading network...
Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming

As an easy-to-use application that provides information at a glance, a gadget basically takes the concept of portal dashboards and moves them to the more accessible Windows desktop where users can quickly and easily obtain weather information, RSS news feeds, and much more. In...

IT Essentials: PC Hardware and Software Labs and Study Guide (3rd Edition) (Lab Companion)
IT Essentials: PC Hardware and Software Labs and Study Guide (3rd Edition) (Lab Companion)
The IT Essentials: PC Hardware and Software version 4 course in the Cisco® Networking Academy® is designed to prepare you to take and pass the CompTIA A+ exams based on the 2006 objectives. You must pass both the A+ Essentials and one of the technician exams to earn the A+ certification. Chapters 1 through 10 cover the foundational...
Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users
Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users

Explore a ton of powerful Ubuntu Linux commands

This handy, compact guide teaches you to use Ubuntu Linux as the experts do: from the command line. Try out over 1000 commands to find and get software, monitor system health and security, and access network resources. Apply skills you learn from this book to use and...

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
Control in Robotics and Automation (Academic Press Series in Engineering)
Control in Robotics and Automation (Academic Press Series in Engineering)
Control in Robotics and Automation has been written to meet the rapidly growing need for sensor-based integration to solve problems in the control and planning of robotic systems. Applications of these control methods range from assembly tasks in industrial automation to material handling in hazardous environments and servicing tasks in space....
Telecommunications and Networks (Computer Weekly)
Telecommunications and Networks (Computer Weekly)
Telecommunications is an old and stable technology if you think only of telephones and telegraph. But in the 1960s came computers and the processing of data. Soon, we needed data communications to transmit data to remote PCs connected by networks. Later, these points of communications increased in number, with the transmission being no longer...
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy