Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning SQL Server 2005 Express Database Applications with Visual Basic Express and Visual Web Developer Express
Beginning SQL Server 2005 Express Database Applications with Visual Basic Express and Visual Web Developer Express
This book especially targets SQL Server Express (SSE), Visual Basic Express (VBE), and Visual Web
Developer Express (VWDE), all of which offer traditional fans of Microsoft technology an inexpensive
and easy route for adapting, learning, and growing professionally. As their names suggest, these
products are all compact versions of
...
Advances in Mobile Radio Access Networks
Advances in Mobile Radio Access Networks
This book gives a comprehensive overview of the technologies for the advances of
mobile radio access networks. The topics covered include linear transmitters,
superconducting filters and cryogenic radio frequency (RF) front head, radio over
fiber, software radio base stations, mobile terminal positioning, high speed
downlink
...
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways...
Moodle E-learning Course Development
Moodle E-learning Course Development
A complete guide to successful learning using Moodle
- Straight-forward coverage of installing and using the Moodle system
- Working with Moodle features in all learning environments
- A unique course-based approach focuses your attention on designing well structured, interactive, and successful courses

...
Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Categories for Software Engineering
Categories for Software Engineering

This book provides a gentle, software engineering oriented introduction to category theory. Assuming only a minimum of mathematical preparation, this book explores the use of categorical constructions from the point of view of the methods and techniques that have been proposed for the engineering of complex software systems: object-oriented...

eDirectory Field Guide
eDirectory Field Guide

eDirectory Field Guide is a handy reference for configuring, troubleshooting, and optimizing Novells eDirectory on NetWare, Linux, Unix, and Windows. Along with Sun ONE Directory Server and Microsoft Active Directory, Novells eDirectory is a leader in directory server software, the specialized database that enterprises employ to store...

Enterprise AJAX: Strategies for Building High Performance Web Applications
Enterprise AJAX: Strategies for Building High Performance Web Applications
If you are like many of the talented developers we meet, you’re interested in AJAX and how you can use it to improve your web applications. You may have even done some preliminary research online, checked out Ajaxian.com, or read a beginner’s book to AJAX development. If not, then you’re like an even larger group of talented...
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth® wireless technology is a short-range radio standard that provides new opportunities for wireless devices. This radio standard was designed originally as a way of eliminating the cables currently attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized...
Web Engineering: Modelling and Implementing Web Applications (Human-Computer Interaction Series)
Web Engineering: Modelling and Implementing Web Applications (Human-Computer Interaction Series)
Web Engineering: Modelling and Implementing Web Applications presents the state of the art approaches for obtaining a correct and complete Web software product from conceptual schemas, represented via well-known design notations.

Describing mature and consolidated approaches to developing complex applications, this edited volume is divided into...

unlimited object storage image
Result Page: 685 684 683 682 681 680 679 678 677 676 675 674 673 672 671 670 669 668 667 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy