Home | Amazing | Today | Tags | Publishers | Years | Search 
Neural Stem Cells for Brain and Spinal Cord Repair (Contemporary Neuroscience)
Neural Stem Cells for Brain and Spinal Cord Repair (Contemporary Neuroscience)

Active neuroscientists survey NSCs as potential tools for central nervous system and spinal cord repair by explaining their clinically significant fundamental properties, manipulations, and potential therapeutic paradigms. Their discussion of the fundamental biology of NSCs illustrates the signaling pathways that regulate stem cell division...

Programming in the .NET Environment
Programming in the .NET Environment

Programming in the .NET Environment is the software developer's guide to the .NET Framework. The authors describe Microsoft's vision for distributed component-based systems development and then show programmers how to develop software that takes full advantage of the features of the .NET...

Integrated Project Management
Integrated Project Management

For the last half-century, people in industry and education have struggled to find better ways to plan and manage projects and to meet project goals on time and within budget. There is no agreed-upon way of doing this. Only a small percentage of projects achieve all their goals and one third of projects never get...

Microsoft Windows 2000 Scripting Guide
Microsoft Windows 2000 Scripting Guide

Welcome to the Microsoft® Windows® 2000 Scripting Guide.

As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...

Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic...
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Linux Development Platform: Configuring, Using, and Maintaining a Complete Programming Environment, The
Linux Development Platform: Configuring, Using, and Maintaining a Complete Programming Environment, The

Tools for high-efficiency Linux development in enterprise environments.

Linux developers have access to an extraordinary array of GNU and open source tools. Now, two leading Linux developers show how to choose the best tools for your specific needs, and integrate them into a complete development...

Inside Solaris™ 9
Inside Solaris™ 9
Inside Solaris 9 gives administrators the information they'll need to upgrade to Solaris 9 and maximize the new features. Author Bill Calkins begins by laying the foundations of Solaris, then explains how to get set up with Solaris 9 (including any potential pitfalls). Next,...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Test Driven Development: By Example
Test Driven Development: By Example

Clean code that works - now. This is the seeming contradiction that lies behind much of the pain of programming. Test-driven development replies to this contradiction with a paradox-test the program before you write it.

A new idea? Not at all. Since the dawn of computing, programmers have been...

Migrating to .NET: A Pragmatic Path to Visual Basic .NET, Visual C++ .NET, and ASP.NET
Migrating to .NET: A Pragmatic Path to Visual Basic .NET, Visual C++ .NET, and ASP.NET

Find out how to migrate your legacy software to the powerful Microsoft .NET framework

  • Provides for a complete, efficient, and elegant migration—with no surprises

  • Covers...

Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Result Page: Previous 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy