Home | Amazing | Today | Tags | Publishers | Years | Search 
Agent-oriented Methodologies
Agent-oriented Methodologies
Building software to solve contemporary business problems is no easy task.
Over the last decade there has been an increasing focus on object-oriented
notations and modelling languages, perhaps at the expense of a full methodological
approach to solving the problem and giving software developers the
tools they need to
...
Phpeclipse: A User Guide
Phpeclipse: A User Guide
The PHP language has come a long way from its humble roots as a set of Perl scripts written by
Rasmus Lerdorf. Today, PHP enjoys enormous market share and the latest release, PHP 5, sports a
robust object-oriented programming model. Naturally, development practices have also matured.
Those of us who taught ourselves PHP in the late
...
Implementing Sugarcrm: A Step-by-step Guide to Using This Powerful Open Source Application in Your Business
Implementing Sugarcrm: A Step-by-step Guide to Using This Powerful Open Source Application in Your Business
Here are just some of the knowledge and skills you will gain when you read this book:

* Learn specific ways in which SugarCRM can increase your profits through richer customer relationships

* The author will help you assess your own companies needs, and plan a SugarCRM implementation tailored specifically to you –...

Macintosh Switcher's Guide (Wordware Macintosh Library)
Macintosh Switcher's Guide (Wordware Macintosh Library)
Maybe you saw the Switcher advertisements on television or the
web. Maybe you were drawn into an Apple Store by the beautiful
machine in the display. Maybe you’ve always thought a little differently,
or wanted something a little different for a change.
Whatever the reason for your switch to Macintosh, here you are....
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

PCs For Dummies
PCs For Dummies
Join the PC generation the fun and easy way®!

Hook up your PC, connect peripherals, get online, and get to work — or play

Don't start a relationship with that PC until you read this book! It's full of the stuff you need — and just the stuff you need — without the technobabble. From bringing your baby home and...

Real World Adobe Creative Suite 2
Real World Adobe Creative Suite 2
Adobe's Creative Suite offers a powerful unified design environment that includes Photoshop CS2, Illustrator CS 2, InDesign CS2, GoLive CS2 and Acrobat 7.0. Problem is, you've still got to learn the thing, and learn it well: Your job, after all, depends on it. No one understands that better than the authors of this book, who draw on their own...
Trustworthy Systems Through Quantitative Software Engineering
Trustworthy Systems Through Quantitative Software Engineering
A benchmark text on software development and quantitative software engineering

"We all trust software. All too frequently, this trust is misplaced. Larry Bernstein has created and applied quantitative techniques to develop trustworthy software systems. He and C. M. Yuhas have organized this quantitative experience into a book of great...

Management of the Object-oriented Development Process
Management of the Object-oriented Development Process
Dilemmas involving notation, project planning, project management, and activity
workflow pervade the world of software development. Object-orientation
provides an elegant language for framing such problems, and powerful
tools for resolving them.

In this book, we have brought together a collection of presentations,
...
Scalable Internet Architectures (Developer's Library)
Scalable Internet Architectures (Developer's Library)
As a developer, you are aware of the increasing concern amongst developers and site architects that websites be able to handle the vast number of visitors that flood the Internet on a daily basis. Scalable Internet Architecture addresses these concerns by teaching you both good and bad design methodologies for...
The C++ Standard Library Extensions: A Tutorial and Reference
The C++ Standard Library Extensions: A Tutorial and Reference

"TR1 roughly doubles the size of the C++ standard library, and it introduces many new facilities and even new kinds of library components. TR1 has some classes, for example, where some nested types may or may not exist depending on the template arguments. To programmers whose experience stops with the standard library, this is strange and...

HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

Result Page: 831 830 829 828 827 826 825 824 823 822 821 820 819 818 817 816 815 814 813 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy