|
|
|
|
C Interfaces and Implementations: Techniques for Creating Reusable Software
Programmers are inundated with information about application programming interfaces, or APIs. Yet, while most programmers use APIs and the libraries that implement them in almost every application they write, relatively few create and disseminate new, widely applicable, APIs. Indeed, programmers seem to prefer to “roll their own”... | | The AWK Programming Language
Computer users spend a lot of time doing simple, mechanical data manipulation
- changing the format of data, checking its validity, finding items with
some property, adding up numbers, printing reports, and the like. All of these
jobs ought to be mechanized, but it's a real nuisance to have to write a specialpurpose
program in a... | | A First Look at SQL Server 2005 for DevelopersSql server 2005 contains features that constitute the biggest change since the internal server rewrite of SQL Server 7. This is true from both programmability and data model viewpoints. This chapter describes SQL Server 2005 in terms of .NET programmability, SQL:1999 compliance, user-defined types (UDTs), and XML integration to... |
|
The Java EE 6 Tutorial: Basic Concepts (4th Edition) (Java Series)
The Java EE 6 Tutorial: Basic Concepts, Fourth Edition, is a task-oriented, example-driven guide to developing enterprise applications for the Java Platform, Enterprise Edition 6 (Java EE 6). Written by members of the Java EE 6 documentation team at Oracle, this book provides new and intermediate Java programmers with a deep... | | Computer Science: An Overview (11th Edition)
This book presents an introductory survey of computer science. It explores the
breadth of the subject while including enough depth to convey an honest appreciation
for the topics involved.
Computer Science: An Overview uses broad coverage and clear exposition to present a complete picture of the dynamic computer... | | VPNs Illustrated : Tunnels, VPNs, and IPsecVirtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually... |
|
|
Algorithms, Data Structures, and Problem Solving With C++This book was designed for a second course in computer science, which has typically been known as CS-2 Data Structures. The content of CS-2 has been evolving over some time, but there is general agreement that topics such as structures, pointers, and data structures should be taught, along with an introduction to algorithm analysis and a general... | | Introduction to GUI with SwingModern operating systems such as Microsoft’s Windows, Apple’s MacOS, and the different Unix-based versions such as Linux or Solaris use a graphical interface to communicate with the user. The communication consists of information displayed by programs and actions and commands issued by the user. This book is an introduction to graphic... | | |
|
|
Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 |