Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
T-SQL Fundamentals (3rd Edition)
T-SQL Fundamentals (3rd Edition)

Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces
...

SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Digital Signal Processing: Laboratory Experiments Using C and the TMS320C31 DSK
Digital Signal Processing: Laboratory Experiments Using C and the TMS320C31 DSK
"A practical guide to using the TMS320C31 DSP Starter Kit

With applications and demand for high-performing digital signal processors expanding rapidly, it is becoming increasingly important for today's students and practicing engineers to master real-time digital signal processing (DSP) techniques.

Digital Signal Processing:...

Digital Signal Processing
Digital Signal Processing
An up-to-the-minute textbook for junior/senior level signal processing courses and senior/graduate level digital filter design courses, this text is supported by a DSP software package known as D-Filter which would enable students to interactively learn the fundamentals of DSP and digital-filter design. The book includes a free license to...
Memory Architecture Exploration for Programmable Embedded Systems
Memory Architecture Exploration for Programmable Embedded Systems
Continuing advances in chip technology, such as the ability to place more
transistors on the same die (together with increased operating speeds) have
opened new opportunities in embedded applications, breaking new ground in
the domains of communication, multimedia, networking and entertainment.
New consumer products, together
...
Linked Data: A Geographic Perspective
Linked Data: A Geographic Perspective

Geographic Information has an important role to play in linking and combining datasets through shared location, but the potential is still far from fully realized because the data is not well organized and the technology to aid this process has not been available. Developments in the Semantic Web and Linked Data, however, are making it...

JavaScript Bible
JavaScript Bible

The bestselling JavaScript reference, now updated to reflect changes in technology and best practices

As the most comprehensive book on the market, the JavaScript Bible is a classic bestseller that keeps you up to date on the latest changes in JavaScript, the leading technology for incorporating interactivity into Web...

Professional JavaScript for Web Developers (Wrox Professional Guides)
Professional JavaScript for Web Developers (Wrox Professional Guides)
Although once supported by Netscape Enterprise Server and Active Server Pages (ASP) on the server,
JavaScript is primarily a client-side scripting language for use in Web browsers. Its main focus today is
to help developers interact with Web pages and the Web browser window itself.

JavaScript is very loosely based on Java, an
...
JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Result Page: 26 25 24 23 22 21 20 19 18 17 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy