Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Binding with Windows Forms 2.0 : Programming Smart Client Data Applications with .NET
Data Binding with Windows Forms 2.0 : Programming Smart Client Data Applications with .NET

"Data Binding with Windows Forms 2.0 earns a gold star and a prized place in my development book library. Brian is an exceptional teacher of technology, best practices, and technique. He continues to educate at every presentation I attend; his book...

Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Telephone networks have come a long ways in the last 100 years. Or have they? If one looks at how a telephone network works, not much has changed. Connections are still made through “dedicated” circuits connected end to end for the duration of a call. While switchboard operators have been replaced by digital switching systems, the...
Hitchhiker's Guide to Visual Studio and SQL Server: Best Practice Architectures and Examples (Microsoft Windows Server System Series)
Hitchhiker's Guide to Visual Studio and SQL Server: Best Practice Architectures and Examples (Microsoft Windows Server System Series)

Since 1994 when he wrote his first "Hitchhiker's Guide", William Vaughn has been providing developers all over the world the intimate details of how SQL Server can be accessed and managed from RAD languages like Visual Basic and Visual Basic .NET. With the 7th Edition, Bill has completely rewritten this encyclopedic...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides)
Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides)
ASP.Net security covers a broad range of subjects. Concepts such as Web security features, developing in partial trust, forms authentication, and securing configuration - just to name a few p are all integral components to helping developers ensure reliable security. Addressing the ASP.NET security features from the developer's point of view, this...
Flash 8 ActionScript Bible
Flash 8 ActionScript Bible

To create Flash applications that sizzle, you have to learn the code. In this comprehensive guide to the latest version of ActionScript, the object-oriented scripting language for Macromedia Flash, you'll get the detailed instruction and step-by-step tutorials you need to write robust code and create sophisticated interactive animations. Work...

Hacking Exposed Web Applications, 2nd Ed.
Hacking Exposed Web Applications, 2nd Ed.

Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,...

PowerPoint 2007 Bible
PowerPoint 2007 Bible

Creating a good presentation is much more than just clicking a few dialog boxes and typing some text. It requires knowledge and planning-lots of it. With the PowerPoint 2007 Bible you will not only be able to build a presentation with PowerPoint, but you’ll also be able to explain why you made the choices you did, and you’ll...

Java 8 in Action: Lambdas, Streams, and functional-style programming
Java 8 in Action: Lambdas, Streams, and functional-style programming

Summary

Java 8 in Action is a clearly written guide to the new features of Java 8. The book covers lambdas, streams, and functional-style programming. With Java 8's functional features you can now write more concise code in less time, and also automatically benefit from multicore architectures. It's...

Web Analytics: An Hour a Day
Web Analytics: An Hour a Day
Develop a Successful Web Analytics Strategy

A Step-by-Step Guide

Learn web analytics the right way with this unique, thoroughly modern guide to today's web analytics challenges and opportunities. Written by an in-the-trenches practitioner, this...

Think and Grow Rich
Think and Grow Rich
...During our ten-year association, I learned the missing number to my combination for worldwide successful achievement. The Master Mind Principle: two or more persons working together in complete harmony toward a mutual goal or goals...Napoleon Hill's philosophy teaches you what you were never taught. Specifically: How to Recognize, Relate,...
AutoCAD 2015 and AutoCAD LT 2015: No Experience Required: Autodesk Official Press
AutoCAD 2015 and AutoCAD LT 2015: No Experience Required: Autodesk Official Press

Learn AutoCAD by example with this tutorial-based guide from Autodesk Official Press

Whether you are just starting out or an experienced user wanting to brush up on your skills, this Autodesk Official Press book provides you with concise explanations, focused examples, and step-by-step instructions through a hands-on...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy