Home | Amazing | Today | Tags | Publishers | Years | Search 
Mac OS X Leopard Bible
Mac OS X Leopard Bible
Get up to speed on Mac OS X Leopard with this in-depth guide

The beauty of Leopard is that there is so much more than meets the eye, including over 300 new enhancements and its ability to run on both Intel PCs and PowerPC Macs. This comprehensive reference is your best guide on how to tame this powerful new cat. You'll find...

Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
"An excellent, ground breaking book, highly recommended."--Books-On-Line

The American ENIAC is customarily regarded as having been the starting point of electronic computation. This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during
...
Managing and Mining Multimedia Databases
Managing and Mining Multimedia Databases
Reading Data Mining by Bhavani Thuraisingham is a poignant experience masterful and readable summary of her field...a profound overview of an important domain of human knowledge a memorable opus.
-Dr. Dobb's Journal

There is now so much data on the Web that managing it with conventional tools is becoming almost
...
ColdFusion 8 Developer Tutorial
ColdFusion 8 Developer Tutorial
Adobe ColdFusion is an application server, renowned for rapid development of dynamic websites, with a straightforward language (CFML), powerful methods for packaging and reusing your code, and AJAX support that will get developers deep into powerful web applications quickly.

This book is the most intense guide to creating professional
...
Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours
Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours
Sams Teach Yourself Access 2002 Programming in 24 Hours will considerably improve the quality of the database applications that the reader can create with Microsoft Access. Concise tutorials that quickly bring the reader up to speed will be the goal of each chapter. Having completed this book, the readers will be able to understand any sample VBA...
Visual Basic and COM+ Programming by Example
Visual Basic and COM+ Programming by Example
A hands-on resource combining Visual Basic programming with COM+ programming. In addition to learning Visual Basic, readers learn how to administer COM+ components and provide security. They also learn how COM+ can be used to solve problems of Enterprise Application Integration.

(InformIT) A guide to learning program Visual Basic and COM+...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
"It is easy to write books that address broad topics and ideas leaving the reader with the question Yes, but how? By combining a comprehensive guide to data preparation for data mining along with specific examples in SAS, Mamdouh's book is a rare finda blend of theory and the practical at the same time. As anyone who has mined data will...
Essential XUL Programming
Essential XUL Programming
Start building XUL-based applications with this introduction to XUL and its technologies

With so many different programming languages and operating systems, developers have been clamoring for a single "meta-language" to develop user interfaces that are cross-platform and cross-device. Mozilla.org responded by creating
...
Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies (Artech House Mobile Communications Library)
Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies (Artech House Mobile Communications Library)
With the fast pace of change in today’s business environment, the need to transform organizations into agile enterprises that can respond quickly to change has never been greater. Methods and computer technologies are needed to enable rapid business and system change, and this practical book shows professionals how to achieve this agility....
The Bank Analyst's Handbook: Money, Risk and Conjuring Tricks
The Bank Analyst's Handbook: Money, Risk and Conjuring Tricks
Financial institutions have few friends. However, despite their poor image, they provide a range of services without which it is difficult to envisage how a modern economy could operate. It is also true that banks attract some of the brightest and most highly qualified people of any industry. Money is one factor, banks pay well for top talent, but...
Result Page: 389 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy