Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself the C# Language in 21 Days
Sams Teach Yourself the C# Language in 21 Days

In just 21 days readers will learn how to use the key features of the C# programming language-not only the commands, but how to create entire programs using them within a few simple chapters. This book is designed to teach C# from the ground up-each lesson is built to supplement the chapter before to provide a fully rounded understanding of the...

Proofs of a Conspiracy Against All the Religions and Governments of Europe
Proofs of a Conspiracy Against All the Religions and Governments of Europe
1798. This old book presents the proofs of a conspiracy against all the religions and governments of Europe carried on in the secret meetings of Freemasons, Illuminati and Reading Societies, collected from good authorities by John Robison, Professor of natural philosophy and Secretary to the Royal Society of Edinburgh, to which is added a...
Seismic Amplitude Inversion in Reflection Tomography
Seismic Amplitude Inversion in Reflection Tomography

This is the first book of its kind on seismic amplitude inversion in the context of reflection tomography. The aim of the monograph is to advocate the use of ray-amplitude data, separately or jointly with traveltime data, in reflection seismic tomography.

The emphasis of seismic exploration is on imaging techniques, so that
...

Chronic Fatigue Syndrome (Diseases and Disorders)
Chronic Fatigue Syndrome (Diseases and Disorders)

Examines the symptoms, treatment options, and mystery of chronic fatigue syndrome, ongoing research into its causes, and how to live with this disease.

CHARLES BEST, ONE of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the...

Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond
Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond

"Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking."
—Tom Clark, Director, Technical Marketing, Nishan Systems

The Windows and enterprise storage markets are...

Programming Microsoft Office Access 2003 (Core Reference)
Programming Microsoft Office Access 2003 (Core Reference)

Whether you’re extending an existing database or developing a complex custom solution, get the code and instruction you need to exploit the power and performance of Access 2003. The newest edition o this acclaimed reference packs even more real-world examples and best practices for writing, testing, and debugging extensible database...

$30 Music School
$30 Music School

"Making art your full-time job is a full-time job." If you're ready to take on this job, then you're ready to follow the advice that you'll find inside $30 Music School. Do-it-Yourself recording, distribution, and promotion have made it easier than ever to make a living making music. Learn how to thrive in this new...

The Internet Encyclopedia, Volume 3
The Internet Encyclopedia, Volume 3
The only comprehensive guide to every Internet topic-from ActiveX to XBRL
The definitive, three-volume Internet Encyclopedia covers every aspect of the Internet for professionals. This up-to-date compendium offers a broad perspective on the Internet as a business tool, an IT platform, and a medium for communications and commerce. It presents
...
Mastering MySQL 4
Mastering MySQL 4

MySQL has proven it can compete with the big names in database management, such as SQL Server and Oracle, and with MySQL 4 this is truer than ever. Mastering MySQL 4 is your one-stop resource for all the information you need to create, maintain, use, and extend a MySQL database. It’s also essential reading for anyone developing...

Linux Security Cookbook
Linux Security Cookbook
f you run a Linux machine, you must think about security. Consider this story told by Scott, a system administrator we know:

In early 2001, I was asked to build two Linux servers for a client. They just wanted the machines installed and put online. I asked my boss if I should secure them, and he said no, the...

Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
Hacker Disassembling Uncovered
Hacker Disassembling Uncovered
This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

This book is dedicated to the basics of hacking—methods of analyzing programs using a...

unlimited object storage image
Result Page: Previous 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy