|
|
|
|
Distributed Applications with Microsoft Visual Basic 6.0 MCSD Training KitFor Visual Basic (VB) programmers seeking the Microsoft Certified Developer (MSCD) credential, Distributed Applications for Microsoft Visual Basic 6.0 MCSD Training Kit provides a good resource for the material you'll likely face on the test, "Distributing and Implementing Distributed Applications with Microsoft Visual Basic 6.0"... | | The Method of Moments in ElectromagneticsResponding to the need for a clear, up-to-date introduction to the field, The Method of Moments in Electromagnetics explores surface integral equations in electromagnetics and presents their numerical solution using the method of moments (MOM) technique. It provides the numerical implementation aspects at a nuts-and-bolts level... | | |
|
| | | | System Architecture with XML"The whole world is talking XML, and the ramifications of its universal adoption are only beginning to surface. Whole business models will be affected by it; whole new business interests are being pursued because of it. The software industry itself will be rocked by it more than it cares to admit. This is so because XML brings us into the... |
|
| | Deciphering Growth (Research and Perspectives in Endocrine Interactions)
An organism’s body size tells us a lot about how it makes a living, suggesting that
body size is a key parameter in evolution. We outline three large-scale trends in
body size evolution. Bergmann’s Rule is the tendency for warm-blooded species
at high latitudes to be larger than their close relatives nearer the equator.... | | |
|
An Introduction to Programming with Mathematica, Third Edition
"Essential...a welcome addition to the literature. The choice of topics and their presentation are lucidly informed by considerable experience. The writing style is straightforward and clear. The authors stick resolutely to their goal of producing an introductory text, not a complete treatment, on programming in Mathematica. As such it... | | Use of Force: A Thriller (The Scot Harvath Series)
“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy
From #1 New York Times bestselling author Brad Thor.
As a storm rages across the Mediterranean Sea, a... | | Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... |
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |