Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
T-SQL Fundamentals (3rd Edition)
T-SQL Fundamentals (3rd Edition)

Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces
...

Pro T-SQL Programmer's Guide
Pro T-SQL Programmer's Guide

Pro T–SQL Programmer’s Guide is your guide to making the best use of the powerful, Transact-SQL programming language that is built into Microsoft SQL Server's database engine. This edition is updated to cover the new, in-memory features that are part of SQL Server 2014. Discussing new and existing features, the book...

Fruit and Vegetable Gardening
Fruit and Vegetable Gardening

Whether you have a kitchen garden, a spot in a community garden, a small vegetable patch, or just a collection of pots and window boxes, Fruit & Vegetable Gardening is an essential, comprehensive guidebook for growing your own fruits and veggies.

Offering all the basics, from soil preparation and organic manures, to...

Black & Decker The Book of Home Improvement: The Most Popular Remodeling Projects Shown in Full Detail
Black & Decker The Book of Home Improvement: The Most Popular Remodeling Projects Shown in Full Detail
This comprehensive guide to home improvement includes the top 100 home improvement projects, all in full, step-by-step instruction, and all from the trusted experts at BLACK+DECKER.

Boasting 560 pages of hardworking, how-to instructions and photos, this is quite possibly the only home remodeling you, or any
...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

MariaDB and MySQL Common Table Expressions and Window Functions Revealed
MariaDB and MySQL Common Table Expressions and Window Functions Revealed

Walk away from old-fashioned and cumbersome query approaches and answer your business intelligence questions through simple and powerful queries built on common table expressions (CTEs) and window functions. These new features in MariaDB and MySQL help you to write queries without having to wade through a quagmire of brittle self-joins and...

Subclassing and Hooking with Visual Basic
Subclassing and Hooking with Visual Basic

Subclassing & Hooking with Visual Basic offers developers a unique way to customize Windows behavior.

Windows is a message-based system. Every action you request creates one or more messages to carry out the action. These messages are passed between objects and carry with them information that gives the...

Pro T-SQL 2012 Programmer's Guide
Pro T-SQL 2012 Programmer's Guide

Pro T–SQL 2012 Programmer’s Guide is every developer’s key to making full use of SQL Server 2012’s powerful, built–in Transact–SQL language. Discussing new and existing features, the book takes you on an expert guided tour of Transact–SQL functionality. Fully functioning examples and...

CLR via C#, Second Edition (Pro Developer)
CLR via C#, Second Edition (Pro Developer)
Expert guidance from well-known programming author Jeff Richter about the CLR and the .NET Framework 2.0. Your hands-on guide to developing applications with the common language runtime (CLR) and Microsoft .NET Framework 2.0, with examples in Microsoft Visual C# 2005.

Over the years, Microsoft has introduced various technologies to help
...
Introduction to Fuzzy Logic using MATLAB
Introduction to Fuzzy Logic using MATLAB
The world we live in is becoming ever more reliant on the use of electronics and computers to control the behavior of real-world resources. For example, an increasing amount of commerce is performed without a single banknote or coin ever being exchanged. Similarly, airports can safely land and send off airplanes without ever looking out of a...
The Limits of Dream: A Scientific Exploration of the Mind / Brain Interface
The Limits of Dream: A Scientific Exploration of the Mind / Brain Interface

The Limits of Dream focuses on what we currently know of the human central nervous system (CNS), examining the basic sciences of neurochemisty, neuroanatomy, and CNS electrophysiology as these sciences apply to dream, then reaching beyond basic science to examine the cognitive science of dreaming including the processes of memory, the...

Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)
Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)

Let’s begin with a quick glimpse into a typical day at a company:

There you are at your desk, wanting to talk with your colleague Steve in another office about a new project you need his help on. You turn to your laptop, switch to a software program, and look at Steve’s presence info. The little bubble next to...

Result Page: 26 25 24 23 22 21 20 19 18 17 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy