Home | Amazing | Today | Tags | Publishers | Years | Search 
Murach's Java Servlets and JSP, 2nd Edition
Murach's Java Servlets and JSP, 2nd Edition

Ever since the late 1990s when Java servlets and JavaServer Pages (JSPs) came into widespread use, web site developers have been switching from CGI scripting languages to servlets and JSPs. As a result, there has been tremendous growth in the use of servlets and JSPs. Today, there's little doubt that scrvlet and JSP technology is here to...

Microsoft Lync Server 2010 Unleashed
Microsoft Lync Server 2010 Unleashed

This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...

Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

Sams Teach Yourself SQL in 24 Hours (5th Edition)
Sams Teach Yourself SQL in 24 Hours (5th Edition)

In just 24 sessions of one hour or less, you’ll learn how to use SQL to build effective databases, efficiently retrieve your data, and manage everything from performance to security! Using this book’s straightforward, step-by-step approach, you’ll learn hands-on through practical examples. Each lesson...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go
Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go

Use FileMaker® technologies to create powerful mobile data apps for iPhone®, iPod® touch, and iPad™

 

Apple’s FileMaker technologies make it easy to create powerful, data-driven apps for iPhone, iPod touch, iPad, and any mobile...

Logical Foundations of Computer Science: International Symposium, LFCS 2007
Logical Foundations of Computer Science: International Symposium, LFCS 2007

The Symposium on Logical Foundations of Computer Science series provides a forum for the fast-growing body of work in the logical foundations of computer science, e.g., those areas of fundamental theoretical logic related to computer science. The LFCS series began with “Logic at Botik,” Pereslavl-Zalessky, 1989, which was...

Pro DNS and BIND 10
Pro DNS and BIND 10

Every time you get e-mail, every time you access a web page, you use the Domain Name System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day. Every one of those 2 billion requests originate from a DNS that supports a group of local users, and every one of them is finally answered by a DNS server that may...

Calculus For Dummies
Calculus For Dummies

The mere thought of having to take a required calculus course is enough to make legions of students break out in a cold sweat. Others who have no intention of ever studying the subject have this notion that calculus is impossibly difficult unless you happen to be a direct descendant of Einstein.

Well, the good news is that you...

Linux Shell Scripting Cookbook
Linux Shell Scripting Cookbook

GNU/Linux is a remarkable operating system that comes with a complete development environment that is stable, reliable, and extremely powerful. The shell, being the native interface to communicate with the operating system, is capable of controlling the entire operating system. An understanding of shell scripting helps you to have better...

Murach's ADO.NET 4 Database Programming with VB 2010
Murach's ADO.NET 4 Database Programming with VB 2010

Now in its 4th Edition, this book shows Visual Basic developers how to use Visual Studio and ADO.NET to develop database applications the way the best professionals do. You'll learn how to:

  • quickly create Windows and web applications by dragging-and-dropping data controls in Visual Studio 2010
  • code your...
Result Page: 879 878 877 876 875 874 873 872 871 870 869 868 867 866 865 864 863 862 861 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy