Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows 7 Portable Command Guide: MCTS 70-680, 70-685 and 70-686
Windows 7 Portable Command Guide: MCTS 70-680, 70-685 and 70-686

All the MCTS 70-680, and MCITP 70-685 and 70-686 Commands in One Compact, Portable Resource

 

Maximize your efficiency as a Windows 7 administrator, and master all the commands, keywords, command arguments, options, and prompts covered on Microsoft’s...

PowerBuilder 9: Internet and Distributed Application Development
PowerBuilder 9: Internet and Distributed Application Development

This book is about the development of distributed applications using PowerBuilder. PowerBuilder has evolved over the years from a pure client/server tool to a tool that supports and enhances the development experience.

Version 9 of PowerBuilder introduces many features designed specifically to blend the traditional strength of...

Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen
Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen

The 7th Workshop on Approximation and Online Algorithms (WAOA 2009) focused on the design and analysis of algorithms for online and computationally hard problems. Both kinds of problems have a large number of applications from a variety of fields. WAOA 2009 took place in Copenhagen, Denmark, during September 10–11, 2009. The workshop...

Functional and Logic Programming: 10th International Symposium, FLOPS 2010
Functional and Logic Programming: 10th International Symposium, FLOPS 2010

This volume contains the proceedings of the 10th International Symposium on Functional and Logic Programming (FLOPS 2010), held in Sendai, Japan, April 19–21, 2010 at Aoba Memorial Hall, Tohoku University.

FLOPS is a forum for research on all issues concerning declarative programming, including functional programming and...

IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations
IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations

My first encounter with software configuration management was way back in the eighties while at university – and way before I knew that it was called software configuration management. We were doing a student project and were five people working on this group project. I was coding away, slipping into experiments that eventually took the...

CMS Made Simple Development Cookbook
CMS Made Simple Development Cookbook

The CMS Made Simple Development Cookbook gets you started building feature-rich sites quickly, regardless of your experience level. It contains clear recipes that introduce the key concepts behind each approach to extending the CMS, while also providing examples of solutions to real-world problems.

CMS Made Simple has great...

Pro Android Web Apps: Develop for Android using HTML5, CSS3 & JavaScript
Pro Android Web Apps: Develop for Android using HTML5, CSS3 & JavaScript

Developing applications for Android and other mobile devices using web technologies is now well within reach. When the capabilities of HTML5 are combined with CSS3 and JavaScript, web application developers have an opportunity to develop compelling mobile applications using familiar tools. Not only is it possible to build mobile web apps that...

From Still to Motion: A photographer's guide to creating video with your DSLR (Voices That Matter)
From Still to Motion: A photographer's guide to creating video with your DSLR (Voices That Matter)

Book and accompanying DVD with over six hours of video training—all geared to teach you everything about shooting video with your DSLR

With the arrival of high-definition video-enabled DSLR cameras, photographers are faced with an opportunity for creativity and a competitive edge in their field unlike
...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

High Performance Computing on Vector Systems 2010
High Performance Computing on Vector Systems 2010

This book covers the results of the 11th and 12th Teraflop Workshop and continued a series initiated by NEC and the HLRS in 2004. As part of the TeraflopWorkbench, it has become a meeting platform for scientists, application developers, international experts and hardware designers to discuss the current state and future directions of...

PowerPivot for Business Intelligence Using Excel and SharePoint
PowerPivot for Business Intelligence Using Excel and SharePoint

PowerPivot comprises a set of technologies for easy access to data mining and business intelligence analysis from Microsoft Excel and SharePoint. Power users and developers alike can create sophisticated, online analytic processing (OLAP) solutions using PowerPivot for Excel, and then share those solutions with other users via PowerPivot for...

Cacti 0.8 Beginner's Guide
Cacti 0.8 Beginner's Guide

Generally speaking, network management refers to the tasks associated with running a network, along with the software, tools, and technology required to support these tasks. One major part of running a network is to monitor the devices on it in order to know
what is happening.

One definition of network management from the...

Result Page: 1834 1833 1832 1831 1830 1829 1828 1827 1826 1825 1824 1823 1822 1821 1820 1819 1818 1817 1816 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy