Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Vista(TM) Plain & Simple (Bpg-Plain & Simple)
Windows Vista(TM) Plain & Simple (Bpg-Plain & Simple)
Get the fast answersin full colorthat make learning the new Windows Vista operating system plain and simple! Windows Vista helps you more effectively use your PCwith simple ways to find and use your information, enjoy your digital media, and connect to technologies and people. This no-nonsense guide helps you learn the easy way to navigate this new...
Visual C++ Windows Shell Programming
Visual C++ Windows Shell Programming
The Windows shell provides much of the look and feel of the Windows 98/Windows NT 4 desktop, and it offers many new possibilities for writing better programs. Visual C++ 6 Windows Shell Programming provides an excellent guide to understanding and programming the Windows shell, in a book filled with expert tips and useful code.

The...

Writing Scientific Software: A Guide to Good Style
Writing Scientific Software: A Guide to Good Style
The core of scientific computing is designing, writing, testing, debugging and modifying numerical software for application to a vast range of areas: from graphics, meteorology and chemistry to engineering, biology and finance. Scientists, engineers and computer scientists need to write good code, for speed, clarity, flexibility and ease of re-use....
Professional SQL Server 2005 CLR Programming: with Stored Procedures, Functions, Triggers, Aggregates and Types
Professional SQL Server 2005 CLR Programming: with Stored Procedures, Functions, Triggers, Aggregates and Types
SQL Server 2005 offers the capability to write code in a .NET language that can be compiled and run inside SQL Server. CLR Integration, or SQL CLR, lets you create stored procedures, user-defined types, triggers, table valued functions, and aggregates using a .NET managed language. You can read and write to resources outside of SQL Server and enjoy...
Regular Expression Recipes for Windows Developers: A Problem-Solution Approach
Regular Expression Recipes for Windows Developers: A Problem-Solution Approach

Regular Expressions are an essential part of programming, but they can be hard to come to grips with. Regular Expression Recipes for Windows Developers contains over 100 of the most popular regular expressions, along with explanations of how to use each one. Languages covered include JavaScript, VB, VB.NET, and C#.

This...

Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest...
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of systems evolution to managerial aspects of the topic. It includes very contemporary issues such as evolving legacy systems to e-business, applying patterns for reengineering...
Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress best-selling book Ethereal Packet Sniffing.

This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows,
...
Show Me Microsoft Office Outlook 2003
Show Me Microsoft Office Outlook 2003

Microsoft Office Outlook 2003 provides powerful new tools with which to get connected, manage information, and communicate with others. It is the most-changed application in this revision of the Office products, including an entirely new interface as well as improvements in junk mail blocking and security. Outlook 2003 takes advantage of the...

Logic Programming with Prolog
Logic Programming with Prolog
This book teaches the techniques of Logic Programming through the Prolog language. The name stands for Programming in Logic. Prolog has been used for a wide variety of applications, including as the basis for a standard ‘knowledge representation language’ for the Semantic Web – the next generation of internet technology; it is one...
How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

Result Page: 729 728 727 726 725 724 723 722 721 720 719 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy