Home | Amazing | Today | Tags | Publishers | Years | Search 
Flex 4 in Action: Revised Edition of Flex 3 in Action
Flex 4 in Action: Revised Edition of Flex 3 in Action

Flex 4 in Action is an easy-to-follow, hands-on Flex 4 tutorial. Revised and updated from the previous edition on Flex 3, this book is chock-full of examples, goes beyond feature coverage, and helps readers put Flex to work in real day-to-day tasks. This book helps Flex developers make their Flex applications stand out from...

C# in Depth, Second Edition
C# in Depth, Second Edition

C# has changed significantly since it was first introduced. With the many upgraded features, C# is more expressive than ever. However, an in depth understanding is required to get the most out of the language.

C# in Depth, Second Edition is a thoroughly revised, up-to-date book that covers the new features of C# 4...

Breakthrough Strategic IT and Process Planning
Breakthrough Strategic IT and Process Planning

This book is the first publication that combines the principles of business process management with strategic IT planning; the result being a groundbreaking work on strategic IT and process planning. While Breakthrough Strategic IT and Process Planning focuses on the real world of organizations, extensive treatment is also devoted to the...

British Logic in the Nineteenth Century, Volume 4 (Handbook of the History of Logic)
British Logic in the Nineteenth Century, Volume 4 (Handbook of the History of Logic)

The present volume of the Handbook of the History of Logic is designed to establish 19th century Britain as a substantial force in logic, developing new ideas, some of which would be overtaken by, and other that would anticipate, the century's later capitulation to the mathematization of logic.

British Logic in
...

Transforming Enterprise Cloud Services
Transforming Enterprise Cloud Services

Transforming Enterprise Cloud Services addresses the fundamental ideology of Cloud Services and how enterprises in commercial, federal, and defense industries can transform their current information technology and management models to adopt this new method. It goes beyond the mere description of service frameworks in relation to...

Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Automated Database Applications Testing: Specification Representation for Automated Reasoning
Automated Database Applications Testing: Specification Representation for Automated Reasoning

This book introduces SpecDB, an intelligent database created to represent and host software specifications in a machine-readable format, based on the principles of artificial intelligence and unit testing database operations. SpecDB is demonstrated via two automated intelligent tools. The first automatically generates database constraints...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

iText in Action
iText in Action

With iText, one can transform PDF documents into live, interactive applications quickly and easily. This free and open source library for Java and .NET is the leading tool of its kind, and was primarily developed and maintained by Bruno Lowagie, the author of this book.

iText in Action, Second Edition offers an...

Pragmatic Guide to Subversion (Pragmatic Guides)
Pragmatic Guide to Subversion (Pragmatic Guides)

Subversion sets the standard in version control systems. Championed by open-source developers, Subversion is behind some of today's biggest and most important software, including Apache, FreeBSD, Ruby, and MediaWiki. But more than just a tool for open-source collaboration, Subversion has made a significant impact in the corporate...

ASP.NET Site Performance Secrets
ASP.NET Site Performance Secrets

Do you think that only experts with a deep understanding of the inner workings of ASP.NET, SQL Server, and IIS can improve a website's performance? Think again - because this book tosses that notion out of the window. It will help you resolve every web developer's nightmare - a slow website - with angry managers looking over your...

Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Result Page: 1737 1736 1735 1734 1733 1732 1731 1730 1729 1728 1727 1726 1725 1724 1723 1722 1721 1720 1719 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy