|
|
|
|
|
Programming in Visual Basic 2010: The Very Beginner's Guide
This is an introduction to programming using Microsoft's Visual Basic.NET 2010. It is intended for novice programmers with little or no programming experience or no experience with Visual Basic. The text emphasizes programming logic and good programming techniques with generous explanations of programming concepts written from a... | | | | |
|
Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... | | Mathematical Methods for Physics and Engineering: A Comprehensive GuideFrom reviews of previous editions: '...a great scientific textbook. It is a tour de force ... to write mathematical sections that are both complete and at an appropriate academic level. The authors have clearly succeeded in this challenge, making this a remarkable pedagogical book ... The choice of exercises is excellent and possibly the best... | | Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole
new level. Whether you’re in the IT department, a systems integrator, a business
leader, or an end user, Fusion Applications has more of what you need, less of
what you don’t, and some of what you didn’t even think possible.
... |
|
Micromessaging: Why Great Leadership is Beyond Words
Should you sweat the small stuff?
Absolutely, says Stephen Young-especially when it comes to those critical behaviors that can make or break performance. The reason is simple: no matter what you think you're saying, your words, gestures, and tone of voice can actually communicate something entirely different.
... | | Microsoft Windows XP Registry GuideThe registry is the heart and soul of Microsoft Windows XP. In my other registry books, I said the same thing about the registry in every version of Windows since Microsoft Windows 95, and by the time you're finished reading this book, I hope you'll agree. The registry contains the configuration data that makes the operating system work. The... | | Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... |
|
|
Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 |