Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Application Frameworks in .NET
Developing Application Frameworks in .NET

Application frameworks, which provide a base of common services on which applications are built, offer the benefits of extensibility, modularity, and reusability of both code and design to your applications. This book explains what frameworks are and how they fit into applications, and offers many object-oriented techniques used in...

Debugging Applications for Microsoft .NET and Microsoft Windows
Debugging Applications for Microsoft .NET and Microsoft Windows

You get huge development advantages with Microsoft visual Studio .NET 2003—but you need a new bag of debugging tricks to take full advantage of them in today’s .NET and Win32 development worlds. Learn lethally effective, real-world application debugging techniques for .NET Framework 1.1 and windows with this fully updated...

Wrox's SQL Server 2005 Express Edition Starter Kit (Programmer to Programmer)
Wrox's SQL Server 2005 Express Edition Starter Kit (Programmer to Programmer)

You'll learn the basics of working with SSE databases, and see how the Visual Basic® 2005 Express Edition programming environment is tailored to work well with SSE. Step-by-step examples cover major scenarios that you're likely to face, from installation and development to debugging and deployment. Plus, the CD-ROM features both VB Express...

PowerPivot for Business Intelligence Using Excel and SharePoint
PowerPivot for Business Intelligence Using Excel and SharePoint

PowerPivot comprises a set of technologies for easy access to data mining and business intelligence analysis from Microsoft Excel and SharePoint. Power users and developers alike can create sophisticated, online analytic processing (OLAP) solutions using PowerPivot for Excel, and then share those solutions with other users via PowerPivot for...

Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication
Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication

Building secure distributed Web applications can be challenging. It usually involves integrating several different technologies and products—yet your complete application will only be as secure as its weakest link. This guide presents a practical, scenario-driven approach to designing and building secure ASP.NET applications for...

Corporate Finance Demystified 2/E
Corporate Finance Demystified 2/E

The simple way to master corporate finance

The math, the formulas, the problem solving . . . does corporate finance make your head spin? You're not alone. It's one of the toughest subjects for business students―which is why Corporate Finance DeMYSTiFieD is written in a way that makes learning it easier than...

Quick Start Guide to Oracle Fusion Development: Oracle JDeveloper and Oracle ADF (Osborne ORACLE Press Series)
Quick Start Guide to Oracle Fusion Development: Oracle JDeveloper and Oracle ADF (Osborne ORACLE Press Series)

Get Started with Oracle Fusion Development

Written by a Group Product Manager at Oracle, this Oracle Press guide gets you up and running quickly with your first Oracle Fusion applications. Quick Start Guide to Oracle Fusion Development provides only the essential information you need to build applications in a matter of...

CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
The Cisco authorized self-study test preparation guide for CCIE Security 2.0 350-018 written exam The only official, Cisco endorsed study guide for the CCIE Security 2.0 written exam Includes best-of-breed self-assessment series features, including a CD-ROM test engine, "Do I Know This Already?" quizzes, topic lists/foundation...
Pro Data Backup and Recovery
Pro Data Backup and Recovery

Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...

Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Information Retrieval for Music and Motion
Information Retrieval for Music and Motion
A general scenario that has attracted a lot of attention for multimedia information retrieval is based on the query-by-example paradigm: retrieve all documents from a database containing parts or aspects similar to a given data fragment. However, multimedia objects, even though they are similar from a structural or semantic viewpoint, often reveal...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy