Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
JDBC Recipes: A Problem-Solution Approach
JDBC Recipes: A Problem-Solution Approach
This book provides complete and working solutions for performing database tasks using JDBC.
You can cut and paste solutions from this book to build your own JDBC database applications. All
the solutions have been compiled and tested against two leading databases: MySQL and Oracle.
This book is ideal for anyone who knows some Java
...
Google - Illustrated Essentials (Illustrated Series)
Google - Illustrated Essentials (Illustrated Series)

Welcome to GoogleTM—Illustrated Essentials. If this is your first experience with the Illustrated series, you’ll see that this book has a unique design: each skill is presented on two facing pages, with steps on the left and screens on the right. The layout makes it easy to digest a skill without having to read a lot...

Learn FileMaker Pro 19: The Comprehensive Guide to Building Custom Databases
Learn FileMaker Pro 19: The Comprehensive Guide to Building Custom Databases

Discover how easy it is to create multi-user, cross-platform custom solutions with FileMaker Pro, the relational database platform published by Apple subsidiary Claris International, Inc. Meticulously rewritten with clearer lessons, more real-world examples and updated to include feature changes introduced in recent versions, this...

Advanced Topics in Database Research
Advanced Topics in Database Research
Advanced Topics in Database Research is a series of books on the fields of database, software engineering, and systems analysis and design. They feature the latest research ideas and topics on how to enhance current database systems, improve information storage, refine existing database models, and develop advanced applications. Advanced Topics in...
New Trends in Software Methodologies, Tools and Techniques:  Proceedings of the fifth SoMeT_06, Volume 147 Frontiers in Artificial Intelligence and Applications
New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06, Volume 147 Frontiers in Artificial Intelligence and Applications
Software is the essential enabler for the new economy and science. It creates new markets and new directions for a more reliable, flexible, and robust society. It empowers the exploration of our world in ever more depth. However, software often falls short behind our expectations. Current software methodologies, tools, and techniques remain...
Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

JavaMail API
JavaMail API
Email was the Internet’s first killer app. One of the most frequently asked questions about Java is how to send email from a Java applet or application. While it’s certainly possible to write a Java program that uses sockets to communicate with mail servers, this requires detailed knowledge of some fairly...
Developing Microservices with Node.js
Developing Microservices with Node.js

Key Features

  • Real world example explained chapter after chapter with code examples.
  • Useful concepts for other languages like Java or PHP
  • Easy to follow by people with little to none experience in Node.js
  • Node.js Version 0.12.2 and the latest compatible versions of Seneca and...
Introducing Windows 8: An Overview for IT Professionals (Introducing (Microsoft))
Introducing Windows 8: An Overview for IT Professionals (Introducing (Microsoft))
The Windows 8 operating system is the newest member of the Microsoft Windows family. It differs from earlier Windows releases as much for what it does not change as for what it does change. That is, the features that IT pros loved about Windows 7 are still there in Windows 8—just better. The same keyboard shortcuts,...
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Information and Communications Technologies OECD Communications Outlook 2007
Information and Communications Technologies OECD Communications Outlook 2007
The OECD Communications Outlook provides an extensive range of indicators for different types of communications networks and compares performance indicators such as revenue, investment, employment and prices for service throughout the OECD area. These indicators are essential for industry and for regulators who use benchmarking to evaluate policy...
The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy