Home | Amazing | Today | Tags | Publishers | Years | Search 
Bioinformatics for Geneticists (Hierarchical Exotoxicology Mini Series)
Bioinformatics for Geneticists (Hierarchical Exotoxicology Mini Series)
Bioinformatics for Geneticists describes a step by step approach to key bioinformatics and genetic analysis procedures, based upon practical experience gained after many years of direct bioinformatics support for laboratory geneticists. It features detailed case studies of problems and analytical approaches that are specific to the needs...
Perl Database Programming
Perl Database Programming
Here’s your in-depth guide to creating database-driven applications using Perl.

In this authoritative reference, Perl expert Brent Michalski uses plenty of examples to help you master Perl’s capabilities in database applications with MySQL, PostgreSQL, and Oracle. Along the way, he explores practical applications for cutting-edge...

The Web Testing Companion: The Insider's Guide to Efficient and Effective Tests
The Web Testing Companion: The Insider's Guide to Efficient and Effective Tests
Practical, hands-on techniques for testing the design, globalization, performance, and security of Web applications

Whether you’re a novice or experienced Web tester, this hands-on guide provides you with the practical steps you’ll need to follow to rigorously test across multiple platforms and browsers. Written by one of...

Constructing Intelligent Agents With Java: A Programmer's Guide to Smarter Applications
Constructing Intelligent Agents With Java: A Programmer's Guide to Smarter Applications
Add Artificial Intelligence to your Java applications Learn to design and implement agent-based reasoning, modeling, and learning Build your own personal assistants, Web agents, e-commerce agents, and multiagent systems.

Learn how to create intelligent agents that can automate, mediate, and administer basic business functions.

Java...

The Microsoft Data Warehouse Toolkit: With SQL Server 2005 and the Microsoft Business Intelligence Toolset
The Microsoft Data Warehouse Toolkit: With SQL Server 2005 and the Microsoft Business Intelligence Toolset

As longtime data warehousing practitioners and former Microsoft insiders, authors Joy Mundy and Warren Thornthwaite have extensive experience in building and managing data warehouse (DW) and business intelligence (BI) systems. With this book, they share best practices for using SQL Server 2005 to build a successful DW/BI system. Covering the...

Lotus Notes and Domino 6 Programming Bible
Lotus Notes and Domino 6 Programming Bible
"This unmatched book is a must-have reference for Notes and Domino developers."
– John Hawkins, Editorial Director,
Lotus Advisor Magazine & Conference

If Lotus Notes and Domino 6 can do it, you can do it too...

Whether you’re an architect, developer, or administrator, this guidebook...

Photoshop CS2 Bible, Professional Edition
Photoshop CS2 Bible, Professional Edition
Inside, you'll find advanced coverage of Photoshop CS2
  • Explore new ways to adjust and enhance color
  • Use retouching and color adjustment techniques to correct seemingly impossible-to-fix images
  • Gain control over digital camera images with Photoshop's enhanced Camera Raw capabilities
  • Manage...
The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

The Grid: Core Technologies
The Grid: Core Technologies
Find out which technologies enable the Grid and how to employ them successfully!

This invaluable text provides a complete, clear, systematic, and practical understanding of the technologies that enable the Grid. The authors outline all the components necessary to create a Grid infrastructure that enables support for a range...

Strategic Planning for Information Systems
Strategic Planning for Information Systems
Since the second edition of this book appeared in 1996, we have seen
Information Technology (IT) become an increasingly integral component
of everyone’s working life and personal environment. IT is now
ubiquitous and enables a degree of connectivity that was difficult to
envisage even 10 years ago. The technology has
...
UML Bible
UML Bible
If UML can do it, you can do it too...

Today’s economy demands top quality software development in record time and with maximum efficiency. UML arms you to meet that challenge, and the UML Bible supplies the most comprehensive UML education you can get. One volume covers everything from understanding and using UML and diagramming notation...

Result Page: 279 278 277 276 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy