Home | Amazing | Today | Tags | Publishers | Years | Search 
QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types (QuickTime Developer Series)
QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types (QuickTime Developer Series)
"Buried inside QuickTime are a host of powerful tools for creating, delivering, and playing digital media. The official QuickTime documentation explains 'what' each API function does. But knowing what each function does isn't enough to allow a developer to take full advantage of QuickTime. QuickTime Toolkit fills in the...
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Solaris: System Administration Guide: No.7
Solaris: System Administration Guide: No.7
Covers a broad range of Solaris system administration topics such as managing user accounts and groups; managing server and client support; shutting down and booting a system; managing removable media (CDs, diskettes, and PCMCIA cards); managing software (packages and patches); managing disks and devices; managing file systems, backing up and...
Mastering ColdFusion MX
Mastering ColdFusion MX
This book is designed to teach you how to develop sophisticated, dynamic, and interactive websites by using ColdFusion.

ColdFusion, launched in 1995 by Allaire Corporation (now owned by Macromedia), was the first web application server available for Windows NT–based web servers. ColdFusion is now in a new version named MX, which is
...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
B2B Integration: A Practical Guide to Collaborative E-Commerce
B2B Integration: A Practical Guide to Collaborative E-Commerce
...this guide reveals the key elements of successful B2B integration and collaborative e-commercie by highlighting business needs, technologies and development strategies

Comprehensive guide reveals the key elements of successful B2B integration and collaborative e-commerce, by highlighting business needs, technologies,
...
Innovative Technologies for Information Resources Management (Premier Reference Source)
Innovative Technologies for Information Resources Management (Premier Reference Source)
As information resources management becomes increasingly dependent on emerging technologies to combat its challenges and decipher its effective strategies, the demand builds for a critical mass of research in this area.

Innovative Technologies for Information Resources Management brings together compelling content related to...

Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language that is at the core of SQL Server 2008. Learn to create databases, insert and update data, generate reports, secure your data, and more. Author Joseph Sack takes common...
Sams Teach Yourself Microsoft Windows Server 2003 in 24 Hours
Sams Teach Yourself Microsoft Windows Server 2003 in 24 Hours
Quick and concise coverage of the most important features of .NET Server. Hands-on, easy-to-follow content that allow the reader to install and configure .NET Server. Coverage of advanced networking features such as Virtual Private Networking and Routing and Remote Access. Provides an overview of the .NET initiative and what that means for IT...
Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers
Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers
If you are interested in learning about Web 2.0 and the history of its development, Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers contains all the information you need to understand Web 2.0 and its importance. Read first person accounts from industry leaders and innovators, who describe the influence and potential of Web 2.0, a...
Result Page: 400 399 398 397 396 395 394 393 392 391 390 389 388 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy