Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Network Programming, Third Edition
Java Network Programming, Third Edition

Java's growth over the last 10 years has been nothing short of phenomenal. Given Java's rapid rise to prominence and the even more spectacular growth of the Internet, it's a little surprising that network programming in Java is still so mysterious to so many. It doesn't have to be. In fact, writing network programs in Java...

How to Cheat at IT Project Management
How to Cheat at IT Project Management
Unlike any other book you'll find, this IT project management book synthesizes project management fundamentals, IT processes and procedures, and business fundamentals. Learn how to align your IT projects to the company's strategic objectives. Also learn how to determine which project will solve the right problem at the right time while still...
Excel PivotTables and Charts
Excel PivotTables and Charts

These are powerful, flexible, and complex tools, and most Excel users never tap their full potential. But you can, with Peter Aitken's step-by-step tutorials, understandable instructions, and detailed explanations. You'll learn to create and use PivotTables and charts from the simplest to the most complex.

This book will help you...

From Alien To The Matrix: Reading Science Fiction Film
From Alien To The Matrix: Reading Science Fiction Film
    ‘I really enjoyed From Alien to The Matrix, it seemed like an incredibly necessary book – arming the geeks with tools to read films for the DVD generation – and possibly regeneration. Clear, simple text, in which an understanding of slash fiction is as important to the...
Reason 3 Ignite!
Reason 3 Ignite!
"Reason 3 Ignite!", written for both PC and Mac platforms, is the perfect companion if you're just starting out with this software. Topics are easy to find with the detailed table of contents and the complete, well-organized index. This book, presented in an easy-to-understand manner with step-by-step instructions and many screenshots,...
Making WIN32 Applications Mobile
Making WIN32 Applications Mobile
A key resource to learn how to repurpose Windows applications for handheld devices

When handheld computers were power-hungry and memory-poor, synchronizing calendars and perhaps reading e-mail were all the applications most people needed. Now that handhelds have more power than first-generation desktop computers, the opportunity to do more than...

Microsoft(r) Windows(r) 2000 Server Administrator's Companion
Microsoft(r) Windows(r) 2000 Server Administrator's Companion
MICROSOFT WINDOWS 2000 SERVER ADMINISTRATOR'S COMPANION brings network administrators, systems engineers, and other MIS professionals up to speed on the latest features of Windows 2000 Server, including Active Directory(tm) services, Microsoft Internet Information Server 4.0, the new, integrated console for administrative tools, and more. It's the...
Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Cisco ISP Essentials
Cisco ISP Essentials
A comprehensive guide to the best common practices for Internet service providersLearn the best common practices for configuring routers on the Internet from experts who helped build the InternetGain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS SoftwareUnderstand the Cisco IOS tools essential...
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

Practical Text Mining with Perl (Wiley Series on Methods and Applications in Data Mining)
Practical Text Mining with Perl (Wiley Series on Methods and Applications in Data Mining)
Provides readers with the methods, algorithms, and means to perform text mining tasks

This book is devoted to the fundamentals of text mining using Perl, an open-source programming tool that is freely available via the Internet (www.perl.org). It covers mining ideas from several perspectives—statistics, data mining,...

unlimited object storage image
Result Page: 661 660 659 658 657 656 655 654 653 652 651 650 649 648 647 646 645 644 643 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy