|
|
|
|
Application Development Using Visual Basic and .NETBuild industrial-strength .NET applications with Visual Basic.
- Experienced programmers: Quickly come up to speed on the new, powerful Visual Basic .NET
- Practical, hands-on coverage of the .NET Framework, CLR, ADO.NET, ASP.NET, Web services, security, interoperability, and more
- Running case study:...
| | Embracing Uncertainty: The Essence of LeadershipThis book offers a radically different approach from the clever, but overly simplistic and frequently misleading formulas for success offered by most self-help business literature. The authors believe that in today's turbulent competitive environment it is necessary to embrace uncertainty and set more realistic expectations, while creating greater... | | The Power of Persuasion: How We're Bought and Sold
"An engaging, highly readable survey of the sophisticated methods of persuasion we encounter in various situations. From television to telemarketing and from self-deception to suicide cults, Levine takes a hard look at all the ways we attempt to persuade each other--and how and why they work (or don't). . . . The next time you wonder... |
|
|
|
Learn Lua for iOS Game Development
Apple has been issuing checks to developers, and the 2012 figures indicate that it has so far been
to the tune of $5 billion. In the past, it used to be desktops with Microsoft-based products that were
raking in money for developers, with Visual Basic, or earlier with database products such as dBase
and FoxPro. While the major share... | | Pathology and Genetics of Tumours of the Lung, Pleura, Thymus and Heart (IARC WHO Classification of Tumours)
This book is an authoritative, concise reference on the histological and genetic typing of tumors of the lung, pleura, thymus and heart. Prepared by 200 authors from 25 countries, it contains more than 670 color photographs, numerous MRIs, ultrasound images, CT scans, charts and approximately 2200 references. Diagnostic criteria, pathological... | | Dictionary of Information SecurityIT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification... |
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 |