Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft ASP.NET Programming with Microsoft Visual Basic .NET Version 2003 Step By Step
Microsoft ASP.NET Programming with Microsoft Visual Basic .NET Version 2003 Step By Step

Teach yourself how to write high-performance Web applications with ASP.NET and Visual Basic .NET 2003—one step at a time. This practical, hands-on tutorial expertly guides you through the fundamental tools and technologies, including the common language runtime, Web Forms, XML Web services, and the Microsoft .NET Framework...

Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

SPSS 13.0 Brief Guide
SPSS 13.0 Brief Guide

The SPSS 13.0 Brief Guide provides a set of tutorials designed to acquaint you with the various components of the SPSS system. You can work through the tutorials in sequence or turn to the topics for which you need additional information. You can use this guide as a supplement to the online tutorial that is included with the...

Cognitive Therapy in Groups: Guidelines and Resources for Practice
Cognitive Therapy in Groups: Guidelines and Resources for Practice

The second edition of Cognitive Therapy in Groups by Michael Free has been completely rewritten as a 25-session, structured programme of cognitive therapy in five modules. It is designed in an easy-to-present psycho-educational format that is intended for groups, but can also be used with individuals. It is sufficiently flexible for...

IP Communications and Services for NGN
IP Communications and Services for NGN

Rapid deployment and acceptance of broadband networks, including the 802.11 a/b/g, 3G cellular networks, WiMAX, and emerging 4G cellular IP networks, have sparked a growing reliance on voice over IP and the quickly emerging IP TV and Mobile TV. Providing the necessary background and technical understanding to stay abreast of and even ahead of...

Working Smart in Adobe Photoshop CS2
Working Smart in Adobe Photoshop CS2
Everyone uses Photoshop; however, not everyone uses it efficiently! With this guide, the folks at Adobe Press are hoping to remedy that situation. Realizing that if you're a veteran Photoshop user, you may still be using methods more suitable to long-ago versions and that if you're new to Photoshop, you may be...
Internet Programming With VB
Internet Programming With VB

From seasoned developer Budi Kurniawan comes Internet Programming with Visual Basic, which teaches experienced Visual Basic programmers how to successfully combine two key Microsoft technologies used to drive the Web: Visual Basic and Microsoft Internet Information Server (IIS). This book covers what you as a...

Computer Systems: Theory, Technology and Applications
Computer Systems: Theory, Technology and Applications

An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research.

From operating systems to distributed computing, many of the world's leading researchers provide insight into the latest concepts and theoretical insights--many of which are...

Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings
These are the proceedings of CHES 2004, the 6th Workshop on Cryptographic
Hardware and Embedded Systems. For the first time, the CHES Workshop was
sponsored by the International Association for Cryptologic Research (IACR).
This year, the number of submissions reached a new record. One hundred
and twenty-five papers were
...
CEH Certified Ethical Hacker Study Guide
CEH Certified Ethical Hacker Study Guide

Prepare for the new version of CEH certification with this advanced guide

Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this...

Building Microsoft ASP.NET Applications for Mobile Devices, Second Edition
Building Microsoft ASP.NET Applications for Mobile Devices, Second Edition

Extend your programming expertise across the widest range of mobile devices with this incisive guide to Microsoft ASP.NET mobile controls. Now integrated into Microsoft Visual Studio .NET 2003, ASP.NET mobile controls enable you to build applications that render intelligently on different devices—regardless of markup language, browser, or...

Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
As the only book to address ASP.NET 3.5, AJAX, and IIS 7 security from the developer’s point of view, this book begins with a look at the new features of IIS 7.0 and then goes on to focus on IIS 7.0 and ASP.NET 3.5 integration. You’ll walk through a detailed explanation of the request life cycle for an ASP.NET application running on IIS...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy