Home | Amazing | Today | Tags | Publishers | Years | Search 
Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)
Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)

Of all the fronts fought on by the Jagdflieger during World War 2, the Russian, or Eastern, was easily the most lucrative in terms of targets for the experten. Marry an abundance of targets with the Luftwaffe’s best piston-engined fighter of the war – Focke-Wulf’s Fw 190 ‘Butcher Bird’ – and it quickly...

IBM WebSphere Application Server v7.0 Security
IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server Network Deployment is IBM's flagship J2EE application server platform. It implements the J2EE technology stack. This stack enables the WebSphere Application Server platform to execute the user's Java enterprise applications that perform business functions. There are several roles who use this platform...

Developing High Quality Data Models
Developing High Quality Data Models

I would like to start by explaining how I came to write this book, and to acknowledge its influences and the help I have received along the way.

I have been extremely fortunate. I have a wonderful wife and two wonderful grown-up children, and I have had all but thirty years working for Shell, which provided an environment...

MCTS Self-Paced Training Kit (Exam 70-640): Configuring Windows Server 2008 Active Directory
MCTS Self-Paced Training Kit (Exam 70-640): Configuring Windows Server 2008 Active Directory

This training kit is designed for IT professionals who support or plan to support Microsoft Active Directory (AD) on Windows Server 2008 R2 and who also plan to take the Microsoft Certified Technology Specialist (MCTS) 70-640 examination. It is assumed that you have a solid foundation-level understanding of Microsoft Windows...

Microsoft SharePoint 2010 Business Intelligence Unleashed
Microsoft SharePoint 2010 Business Intelligence Unleashed

Business intelligence (BI) has been around for many more years than you might think. Decision support systems (DSS) and executive information systems (EIS) from the 1970s and 1980s, along with artificial intelligence (AI) systems from the 1990s, can now all be considered as part of what BI comprises today.

In brief, BI refers...

Iron Metabolism: From Molecular Mechanisms to Clinical Consequences
Iron Metabolism: From Molecular Mechanisms to Clinical Consequences

Iron is of fundamental importance to the growth, development and well-being of almost all living organisms. Multiple biological systems have evolved for the uptake, utilisation, storage, and homeostasis of iron in microbes, plants and mammals. Both iron deficiency and iron overload are found extensively in humans; the intimate links between...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Pro DNS and BIND 10
Pro DNS and BIND 10

Every time you get e-mail, every time you access a web page, you use the Domain Name System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day. Every one of those 2 billion requests originate from a DNS that supports a group of local users, and every one of them is finally answered by a DNS server that may...

Pro Drupal 7 for Windows Developers
Pro Drupal 7 for Windows Developers

Drupal 7 opens the door for you as a Windows developer to build Drupal sites - including custom modules - all without leaving Visual Studio! Pro Drupal 7 for Windows Developers gives you everything you need to know to achieve this, whilst drilling down into the advanced topics that you'll want to master whilst working with Drupal...

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Developing J2EE Applications with WebSphere Studio: IBM Certified Enterprise Developer (IBM Certification Study Guides)
Developing J2EE Applications with WebSphere Studio: IBM Certified Enterprise Developer (IBM Certification Study Guides)

To succeed in today's challenging business environment, companies need software developers who can implement integrated enterprise-wide applications and satisfy the demands of customers whose needs continue to evolve. Not only can you become that enterprise developer, but you can also be certified by IBM in the greatest technology...

Inside the Microsoft Build Engine: Using MSBuild and Team Foundation Build
Inside the Microsoft Build Engine: Using MSBuild and Team Foundation Build

Often when people think about build, they think just about the act of compiling some source code – when I hit F5 in the IDE, it builds, right? Well yes, kind of. In a real production build system, there is so much more to it than that. There are many kinds of builds – F5, desktop, nightly, continuous, rolling, gated, buddy etc....

Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy