Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert T-SQL Window Functions in SQL Server 2019: The Hidden Secret to Fast Analytic and Reporting Queries
Expert T-SQL Window Functions in SQL Server 2019: The Hidden Secret to Fast Analytic and Reporting Queries
Become an expert who can use window functions to solve T-SQL query problems. Replace slow cursors and self-joins with queries that are easy to write and perform better. This new edition provides expanded examples, including a chapter from the world of sports, and covers the latest performance enhancements through SQL Server 2019. ...
The Twice-Born: Life and Death on the Ganges
The Twice-Born: Life and Death on the Ganges

In The Twice-Born, Aatish Taseer embarks on a journey of self-discovery in an intoxicating, unsettling personal reckoning with modern India, where ancient customs collide with the contemporary politics of revivalism and revenge

When Aatish Taseer first came to Benares, the spiritual capital of Hinduism, he...

Theodore Roosevelt for the Defense: The Courtroom Battle to Save His Legacy
Theodore Roosevelt for the Defense: The Courtroom Battle to Save His Legacy
A President on Trial. A Reputation at Stake.

Dan Abrams and David Fisher take us inside the courtroom to witness the epic case that would define Theodore Roosevelt’s legacy. The former president had accused the leader of the Republican Party of corruption, setting off a trial that caught the attention
...
Windows XP and Office 2003 Keyboard Shortcuts
Windows XP and Office 2003 Keyboard Shortcuts

Save time and effort while boosting your productivity and simplifying your work with the help of this handy guide. You’ll learn how to use the hundreds of keyboard shortcuts built into Windows XP and the Office applications—from mainstream shortcuts for frequent operations to little-known time-saver that few users ever discover....

JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Database Performance Tuning and Optimization
Database Performance Tuning and Optimization
The book provides comprehensive coverage of database performance tuning and optimization using Oracle 8i as the RDBMS. The chapters contain both theoretical discussions dealing with principles and methodology as well as actual SQL scripts to implement the methodology. The book combines theory with practice so as to make it useful for DBAs and...
Capitalist Pigs: Pigs, Pork, and Power in America
Capitalist Pigs: Pigs, Pork, and Power in America

Pigs are everywhere in United States history. They cleared frontiers and built cities (notably Cincinnati, once known as Porkopolis), served as an early form of welfare, and were at the center of two nineteenth-century “pig wars.” American pork fed the hemisphere; lard literally greased the wheels of...

Fedora Linux
Fedora Linux

"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros." -- Behdad Esfahbod, Fedora developer

This book will get you up to speed quickly on Fedora...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy