Home | Amazing | Today | Tags | Publishers | Years | Search 
Michael Abrash's Graphics Programming Black Book (Special Edition)
Michael Abrash's Graphics Programming Black Book (Special Edition)
Michael Abrash's Graphics Programming Black Book is a collection of the author's previous books on assembly language and graphics programming, as well as past columns for Dr. Dobb's magazine. Though much of the book (such as 8088/286/386 assembly language optimization and VGA graphics programming) is out-of-date by now, the reader can see...
Programming ColdFusion MX, 2nd Edition
Programming ColdFusion MX, 2nd Edition
ColdFusion has enjoyed widespread use among developers as a powerful, easy-to-learn platform for creating and deploying dynamic web applications. ColdFusion's simple, tag-based language makes it easy to handle basic tasks, like processing form data and querying databases, but the language is also powerful enough to deliver highly scalable, robust...
Outsourcing Information Security (Computer Security Series)
Outsourcing Information Security (Computer Security Series)
This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book...
Professional ADO.NET
Professional ADO.NET

ADO.NET is Microsoft's latest data access technology and, as an integral part of the .NET Framework, is far more than simply an upgrade of previous incarnations of ADO. ADO.NET provides an extensive set of .NET classes that facilitate efficient access to data from a large variety of sources, enable sophisticated manipulation and sorting...

Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Windows Vista Pocket Reference: A Compact Guide to Windows Vista
Windows Vista Pocket Reference: A Compact Guide to Windows Vista
This pocket reference is intended to provide the information Windows Vista users need most often in a quick and concise format. This tiny volume is small enough to fit in your pocket or laptop case, yet it is packed with hundreds of tips, shortcuts, and other tidbits of information that will make Windows Vista easier to use.

Windows
...
Definitive XSL-FO
Definitive XSL-FO
The definitive guide to state-of-the-art XML publishing with XSL-FO!

XSL-FO (XSL-Formatting Objects) enables enterprise applications to publish graphic-arts quality printed and electronic documents from any XML data store, no matter how large or complex. In Definitive XSL-FO, one of the world's leading XML experts shows how XSL-FO is...

Absolute Beginner's Guide to Corel WordPerfect 11
Absolute Beginner's Guide to Corel WordPerfect 11

Whether you're new to WordPerfect or upgrading from a previous version, Absolute Beginner's Guide to WordPerfect 11 teaches you what you need to know to get right to work! This fun to read and easy to understand book starts with the basics, helping you build a foundation of knowledge so that you can be confident and comfortable using...

Migrating to Netware 4.1
Migrating to Netware 4.1

In the logical view of the network, resources are organized into groups that are in turn organized into a hierarchy that reflects their usage, function, or geographical location. For the user to use the resources on this network, the user logs in to this logical view of the network. Access to resources on the network can be controlled by...

Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest...
Cutting-Edge Direct3D Programming: Everything You Need to Create Stunning 3D Applications with Direct3D
Cutting-Edge Direct3D Programming: Everything You Need to Create Stunning 3D Applications with Direct3D
Explains Direct3D in clear, understandable language. Appeals to software developers interested in writing any type of 3D application for Windows 95, from hobbyist to professional. Emphasizes development of many types of software, not just games. Includes plenty of demos enabling readers of varying skill levels to create source code ideal for their...
Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XP
Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XP
Targeting IT professionals, system administrators, and experienced users moving to the Windows XP platform, this book enables the user to master registry concepts and architecture, provides a historical overview of the registry, and outlines the differences between Windows 9x/ME and Windows NT/2000/XP registries. Special attention is drawn to the...
Result Page: 558 557 556 555 554 553 552 551 550 549 548 547 546 545 544 543 542 541 540 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy