Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
XSLT Cookbook
XSLT Cookbook
The XSLT Cookbook is a collection of hundreds of solutions to problems that Extensible Stylesheet Language Transformations (XSLT) developers regularly face. The recipes range from simple string-manipulation and mathematical processing to more complex topics like extending XSLT, testing and debugging XSLT...
AdvancED Flash Interface Design (Advanced Design)
AdvancED Flash Interface Design (Advanced Design)
As a competent Flash designer, youre probably comfortable with all of the basics that Flash has to offer. However, youve probably looked at some of the amazing Flash sites on the web and thought, "How'd they do that?" Well, youll find out in this book. Flash allows users to create some amazing interactive interfaces to interact with Rich...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment
Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment

Finally a book on Wireless Sensor Networks that covers real world applications and contains practical advice!

Kuorilehto et al. have written the first  practical guide to wireless sensor networks. The authors draw on their experience in the development and field-testing of autonomous wireless sensor...

Spring Web Flow 2 Web Development
Spring Web Flow 2 Web Development

Many web applications need to take the user through a defined series of steps such as e-commerce checkouts or user registrations. Spring Web Flow works well for rich and flexible user interaction, additionally it helps you to describe the flow of websites in complex processes. Spring Web Flow 2 provides the perfect way to build these kinds of...

Micro Electro Mechanical System Design (Dekker Mechanical Engineering)
Micro Electro Mechanical System Design (Dekker Mechanical Engineering)

It is challenging at best to find a resource that provides the breadth of information necessary to develop a successful micro electro mechanical system (MEMS) design. Micro Electro Mechanical System Design is that resource. It is a comprehensive, single-source guide that explains the design process by illustrating the full range of issues...

SQL Server Query Performance Tuning
SQL Server Query Performance Tuning

Queries not running fast enough? Wondering about the in-memory database features in 2014? Tired of phone calls from frustrated users? Grant Fritchey’s book SQL Server Query Performance Tuning is the answer to your SQL Server query performance problems. The book is revised to cover the very latest in performance optimization...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Game Analytics: Maximizing the Value of Player Data
Game Analytics: Maximizing the Value of Player Data

Developing a successful game in today’s market is a challenging endeavor. Thousands of titles are published yearly, all competing for players’ time and attention. Game analytics has emerged in the past few years as one of the main resources for ensuring game quality, maximizing success, understanding player behavior and enhancing...

Practical Guide to Testing Object-Oriented Software
Practical Guide to Testing Object-Oriented Software
Testing software is a very important and challenging activity. This is a book for
people who test software during its development. Our focus is on object-oriented
and component-based software, but you can apply many of the techniques
discussed in this book regardless of the development paradigm. We assume our
reader is familiar
...
Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)
Sun (R) Certified System Administrator for Solaris (TM) 10 Study Guide (Exams 310-200 & 310-202)

Get the book that shows you not only what—but how—to study

  • 100% complete coverage of all official objectives for Sun Solaris exams CX-310-200 and CX-310-202
  • Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off...
unlimited object storage image
Result Page: 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy