Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenOffice.Org 1.0 Resource Kit
OpenOffice.Org 1.0 Resource Kit
Learn the key features of each application, plus procedures on customizing OpenOffice.org to make using it simple and productive

Comprehensive coverage of each application:

  • Writer—Editing, formatting, mail merge, printing to postscript and PDF, long documents, version control, and comparing documents
  • ...
Successful Software Development (2nd Edition)
Successful Software Development (2nd Edition)

A systematic approach to consistently successful software development.

In the age of the Internet, where software is more mission-critical than ever, it's no longer enough for your development projects to succeed some of the time. You need to deliver excellence, consistently—and you must do it faster than ever.

...

JAVA 2 Network Security (2nd Edition)
JAVA 2 Network Security (2nd Edition)

The complete insider's guide to securing Java 2 enterprise applications!

  • Building secure enterprise applications with Java 2!
  • Integrating Java 2 into your overall security strategy
  • Detailed coverage for managers, developers, netadmins, and security specialists
  • ...
Linux Assembly Language Programming (Prentice Hall Open Source Technology)
Linux Assembly Language Programming (Prentice Hall Open Source Technology)
The first Linux-centered guide to x86 assembly language!

In Linux Assembly Language Programming, Bob Neveln explains all the key features of x86 assembly language in the context of the Linux operating system and the C language. The book's step-by-step, one-concept-at-a-time coverage will help any hardware programmer move to Linux, and master...

Six Sigma for Marketing Processes: An Overview for Marketing Executives, Leaders, and Managers
Six Sigma for Marketing Processes: An Overview for Marketing Executives, Leaders, and Managers

Nearly half of the top one hundred Fortune 500 companies use Six Sigma methodology in some part of their business. These companies have been among the top one hundred for five or more years and consistently report higher revenue and significantly higher profits than competitors. This...

Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Evolving Web services standards and technologies offer limited interoperability when it comes to security, management, and other important application characteristics. Successful interoperability solutions require comprehensive integration strategies that go beyond simple connections. The capability to mitigate security and reliability risks and...
Introduction to Programming Using Visual Basic 2005, An (6th Edition)
Introduction to Programming Using Visual Basic 2005, An (6th Edition)

Based on the newest version of Microsoft's VB. NET, this revision of Schneider's best-selling text is designed for students with no prior computer programming experience. The author uses Visual Basic .NET to explore the fundamentals of programming, building a strong foundation that will give students a sustainable understanding...

NetBeans(TM) IDE Field Guide: Developing Desktop, Web, Enterprise, and Mobile Applications (2nd Edition)
NetBeans(TM) IDE Field Guide: Developing Desktop, Web, Enterprise, and Mobile Applications (2nd Edition)

The Only Complete Guide and Reference for NetBeans™ IDE 5.0

The award-winning NetBeans™ IDE eases all aspects of Java application development, incorporating a wide range of powerful features into one well-designed package. NetBeans IDE is consistently first in supporting the latest Java technologies for...

Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications

Integrate Powerful Scheduling Capabilities into Any Java Application or Environment

 

If your Java applications depend on tasks that must be performed at specific times or if your systems have recurring maintenance jobs that could be automated,...

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Developing Enterprise Web Services: An Architect's Guide
Developing Enterprise Web Services: An Architect's Guide

Build Web services with enterprise-class reliability, performance, and value

Web services are transforming IT, and represent a powerful new way to reduce cost and drive top-line growth throughout the enterprise. This book takes a no-nonsense view of architecting and constructing enterprise-class Web services and...

Practical FPGA Programming in C (Prentice Hall Modern Semiconductor Design Series)
Practical FPGA Programming in C (Prentice Hall Modern Semiconductor Design Series)
High-performance FPGA-accelerated software applications are a growing demand in fields ranging from communications and image processing to biomedical and scientific computing. This book introduces powerful, C-based parallel-programming techniques for creating these applications, verifying them, and moving them into FPGA hardware.

The authors...

Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy