 |
|
 The Art of What Works: How Success Really Happens
How to Find Effective Solutions for Any Business Problem--By Recognizing and Building On the Successes of Others
"There is nothing new under the sun."
Though coined more than 2,000 years back, this truism has straight-line relevance to today's business world. Because while every business... |  |  Mastering Regular ExpressionsRegular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Perl, Python, Ruby, Java, VB.NET and C# (and any language using the .NET Framework), PHP, and MySQL.
If you don't use regular... |  |  Blog MarketingWhat if you could listen to millions of people--customers, employees, competitors, partners, even the media--as they candidly discuss your company, your products, and your advertising? And what if you were able to use this real, up-to-the-minute feedback to determine exactly what your customers want and how to improve your business... |
|
 Transact-SQL Desk Reference: For Microsoft SQL ServerThis is the SQL reference you'll reach for first, every time!
If you're an SQL programmer, you can easily picture how useful a comprehensive, single-volume Transact-SQL command reference manual would be in streamlining your work. And if that book was rich in examples, was written with users of all levels of expertise in mind, and was... |  |  Embedded Linux: Hardware, Software, and InterfacingEmbedded Linux covers the development and implementation of interfacing applications on an embedded Linux platform. It includes a comprehensive discussion of platform selection, crosscompilation, kernel compilation, root filesystem creation, booting, remote debugging, real-world interfacing, application control, data... |  |  Refactoring to Patterns (The Addison-Wesley Signature Series)In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua... |
|
 Objects First with Java: A Practical Introduction Using BlueJWelcome to the first introductory programming textbook that completely integrates BlueJ with the teaching of object-oriented principles using Java.
BlueJ is a Java development environment that runs on top of the Sun Microsystems Java Development Kit making use of the standard compiler and virtual machine. It has been specifically designed... |  |  RSA Security's Official Guide to CryptographyLearn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained... |  |  Hacking Exposed: Network Security Secrets & Solutions, Third Edition"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."... |
|
|
| Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |