Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Professional Crystal Reports for Visual Studio .NET, 2nd Edition
Professional Crystal Reports for Visual Studio .NET, 2nd Edition
The addition of Crystal Reports 9.0 to Visual Studio .NET 2003 offers developers a reporting tool that allows you to turn almost any data into interactive, dynamic content through portals, wireless devices, and Microsoft Office documents. This code-intensive guide takes you step by step through developing reports and incorporating them into...
Beginning Oracle Application Express 4.2
Beginning Oracle Application Express 4.2

Beginning Oracle Application Express 4.2 introduces version 4.2 of the popular and productive Oracle Application Express development platform. Called APEX for short, the platform enables rapid and easy development of web-based applications that make full use of Oracle Database. The release of APEX 4.2 brings extensive new...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Mahara 1.2 E-Portfolios: Beginner's Guide
Mahara 1.2 E-Portfolios: Beginner's Guide

Mahara is a user-centred environment with a permissions framework that enables different views of an e-portfolio to be easily managed. These views helps you display your artefacts - text files, spreadsheets, images, and videos - in a way you choose and to the people you want. You can also create online communities and social networks through...

VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

Universities and Sustainable Communities: Meeting the Goals of the Agenda 2030 (World Sustainability Series)
Universities and Sustainable Communities: Meeting the Goals of the Agenda 2030 (World Sustainability Series)

The book showcases examples of university engagement in community initiatives and reports on the results from research and from a variety of institutional projects and programmes. As a whole, the book illustrates how actors at the community (microlevel) and other levels (meso and macro) can make valuable and concrete contributions to...

The Transparency Edge: How Credibility Can Make or Break You in Business
The Transparency Edge: How Credibility Can Make or Break You in Business

In The Transparency Edge, leadership expert Barbara Pagano demonstrates that a clear and open business policy is a powerful management tool. Backed by exclusive research of thousands of executives at Fortune 500 companies, this comprehensive guide to what-you-see-is-what-you-get leadership shows you how to practice a transparent...

EndNote 1 - 2 - 3  Easy!: Reference Management for the Professional
EndNote 1 - 2 - 3 Easy!: Reference Management for the Professional
Reference management is the process of storing, managing, retrieving, and citing references from various sources. Learning effective reference management is critically important for healthcare and biomedical professionals as it is a major component of the process of scientific manuscript writing. Effective reference management is also useful for...
Programming Microsoft Dynamics™ NAV 2015
Programming Microsoft Dynamics™ NAV 2015

Sharpen your skills and increase your productivity when programming Microsoft Dynamics NAV 2015

About This Book

  • The most comprehensive Dynamics NAV reference guide for programmers, developers, managers, and consultants
  • Covers all the elements needed to learn how to do development in NAV...
Microsoft SQL Server 2008 Reporting Services Unleashed
Microsoft SQL Server 2008 Reporting Services Unleashed

The authoritative, example-rich guide to Microsoft’s powerful reporting platform

With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Result Page: 85 84 83 82 81 80 79 78 77 76 75 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy