Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)
Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)

Whether building a console application, a web service, or a smart client, you eventually need to distribute your finished work. Deploying .NET Applications is a complete guide to delivering applications built with .NET. Packed with hands-on guidance, practical examples, and war stories from the authors' many experiences with deployment...

Turing (A Novel about Computation)
Turing (A Novel about Computation)
Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a...
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko has been writing columns for the computer trade press and championing database programming techniques and ANSI/ISO standards via his newsgroup activity for 20 years.

In this complete revision and expansion of his first SQL Puzzles book, he challenges you with his trickiest puzzlesand then helps solve them with a variety of
...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
How to Buy a House with No (or Little) Money Down, 3rd Edition
How to Buy a House with No (or Little) Money Down, 3rd Edition
The Ultimate guide to finding and financing a home

Almost everyone aspires to owning a home, but the reality of coming up with a large enough down payment often stands in the way of making that dream come true. No longer! How to Buy a House with No (or Little) Money Down has helped tens of thousands become homeowners, and now it's your turn!...

Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Hardware and Computer Organization (Embedded Technology)
Hardware and Computer Organization (Embedded Technology)
Today, we often take for granted the impressive array of computing machinery that surrounds us
and helps us manage our daily lives. Because you are studying computer architecture and digital
hardware, you no doubt have a good understanding of these machines, and you’ve probably written
countless programs on your PCs and
...
Just Enough Project Management: The Indispensable Four-Step Process for Managing Any Project Better, Faster, Cheaper
Just Enough Project Management: The Indispensable Four-Step Process for Managing Any Project Better, Faster, Cheaper
The project-driven approach has proven its value, leading to spectacular results--projects delivered faster and at a more reasonable cost than ever before. Problem is, the project management process used for large projects is too cumbersome and bureaucratic for the projects most of us face, and is often more complex and costly than the problems it...
Semiconductors and the Information Revolution: Magic Crystals that made IT Happen
Semiconductors and the Information Revolution: Magic Crystals that made IT Happen
This book sets out to explain the development of modern electronic systems and devices from the viewpoint of the semiconductor materials (germanium, silicon, gallium arsenide and many others) which made them possible. It covers the scientific understanding of these materials and its intimate relationship with their technology and many applications....
The Evolution Deceit
The Evolution Deceit
For some people the theory of evolution or Darwinism has only scientific connotations, with seemingly no direct implication in their daily lives. This is, of course, a common misunderstanding. Far beyond just being an issue within the framework of the biological sciences, the theory of evolution constitutes the underpinning of a deceptive...
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy