Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PC Magazine - February 7 2006
PC Magazine - February 7 2006
February 7, 2006

First Looks
Envision EN7600
...
Applied C# in Financial Markets (The Wiley Finance Series)
Applied C# in Financial Markets (The Wiley Finance Series)
This book is designed to help experienced programmers into the C# language.
It covers all the relevant concepts of C# from a finance viewpoint.

In the preparation of this book a small standalone futures and options
trading application was written to cover all of the sections of C# that are
relevant to finance and the code
...
Multimedia Database Retrieval:: A Human-Centered Approach (Signals and Communication Technology)
Multimedia Database Retrieval:: A Human-Centered Approach (Signals and Communication Technology)
Multimedia Database Retrieval: A Human-Centered Approach presents the latest development in user-centered methods and the state-of-the-art in visual media retrieval.  It includes discussion on perceptually inspired non-linear paradigm in user-controlled interactive retrieval (UCIR) systems. It also features a coherent approach...
Working Identity: Unconventional Strategies for Reinventing Your Career
Working Identity: Unconventional Strategies for Reinventing Your Career

Whether as a daydream or a spoken desire, nearly all of us have entertained the notion of reinventing ourselves. Feeling unfulfilled, burned out, or just plain unhappy with what we’re doing, we long to make that leap into the unknown. But we also hold on, white-knuckled, to the years of time and effort we’ve invested in our current...

The Definitive Guide to CentOS
The Definitive Guide to CentOS
CentOS is just like Red Hat, but without the price tag and with the virtuous license. When belts have to be tightened, we want to read about an OS with all the features of a commercial Linux variety, but without the pain. The Definitive Guide to CentOS is the first definitive reference for CentOS and focuses on CentOS alone, the workhorse...
Scalable VoIP Mobility: Integration and Deployment
Scalable VoIP Mobility: Integration and Deployment
Today's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these networks and the availability of dual-mode handsets...
Handbook of Transcription Factor NF-kappaB
Handbook of Transcription Factor NF-kappaB

Recent evidence proving the molecular link between unchecked, chronic inflammation and cancer has implicated the transcription factor NF-kB as a key factor in both inhibiting apoptosis and promoting cell proliferation. Since its initial identification 20 years ago as a simple regulating factor in one small part of the immune response, NF-kB...

Agile Software Development with HP Agile Manager
Agile Software Development with HP Agile Manager

Agile development practices have been widely adopted in a variety of organizations, yet only a few tools are available to help make the practical process of managing agile teams less painful and more successful.

HP Agile Manager is a purpose-built SaaS-based Agile planning tool. HP Agile Manager provides a simpler, smarter way to...

Mutiny and Leadership
Mutiny and Leadership
Whenever leadership emerges within a group, there will be resistance to that leadership. Discontent may manifest in a number of ways, and action will always be determined by factors such as resource, numbers, time, space, and the legitimacy of the resistance. What, then, turns discontent into
mutiny?

Mutiny is often
...
Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Microsoft Exchange Server Survival Guide (Version 4.0.)
Microsoft Exchange Server Survival Guide (Version 4.0.)
Microsoft Exchange Server is quickly becoming a popular product in Microsoft's BackOffice suite. As the weeks go by
since its April, 1996 introduction, the momentum behind Exchange Server continues to build. In its first version,
Exchange Server 4.0 is a powerful, feature-rich product that is finding its rightful place in the hands of the
...
Powering Office 2003 with XML (Power Pack Series)
Powering Office 2003 with XML (Power Pack Series)
Find out how to
  • Understand XML specification and schemas
  • Set up and complete InfoPathTMВ forms
  • Design new forms from XML data files
  • Debug InfoPath scripts
  • Tackle real-world problems with the help of case studies
  • ...
unlimited object storage image
Result Page: 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy