 |
|
 ADO.NET and ADO Examples and Best Practices for VB Programmers (Second Edition)
ADO.NET and ADO Examples and Best Practices for VB Programmers, Second Edition brings the popular first edition up to date with fresh insights and tips on COM-based ADOand adds a voluminous section on the new ADO.NET technology. Written specifically for COM-based ADO developers retooling for ADO.NET, this is a developer's book,... |  |  SVG Essentials (O'Reilly XML)SVG Essentials introduces you to the Scalable Vector Graphics XML application. SVG, a recommendation from the World Wide Web Consortium, uses XML to describe graphics that are made up of lines, curves, and text. This rather dry definition does not do justice to the scope and power of SVG.
You can add SVG graphics to an Extensible... |  |  Inside Microsoft. NET IL assembler.NET IL Assemble is the intermediate language that the .NET common language runtime converts to machine language in .NET applications. Get the inside scoop on this critical low-level language with an architectural guide from the most reliable authority-the language's designer, Serge Lidin. You'll discover common structures, functions, and rules for... |
|
 Building Web Solutions with ASP.NET and ADO.NETDiscover how to use ADO.NET and ASP.NET essentials to take your Web programming skills to the next level.
Most Web applications follow a simple “3F” pattern: fetch, format, and forward to the browser. With this in-depth guide, you’ll take your ASP.NET and ADO.NET skills to the next level and learn key ... |  |  Microsoft ADO.NET Step by StepLearn to use the ADO.NET model to expand on data-bound Windows and Web Forms, as well as how XML and ADO.NET intermingle.
ADO.NET is the data access component of Microsoft’s new .NET Framework. Microsoft bills ADO.NET as “an evolutionary improvement” over previous versions of ADO, a claim that has been... |  |  XML Security Keep XML applications and documents secure with help from the leading authority in e-security
Get up to speed on XML and applied security technologies using this authoritative guide. Covering the fundamentals of XML structures and related security technologies--including XML signatures, XML encryption, and the XML key management... |
|
 |  |  |  |  Heuristic and Optimization for Knowledge DiscoveryWith the large amount of data stored by many organizations, capitalists have observed that this information is an intangible asset. Unfortunately, handling large databases is a very complex process and traditional learning techniques are expensive to use. Heuristic techniques provide much help in this arena, although little is known about heuristic... |
|
 mod_perl Developer's Cookbook (Developer's Library)mod_perl is a unique piece of software that wholly integrates the power of Perl with the flexibility and stability of the Apache Web server. With mod_perl, developers can harness the power of the full Apache API and develop Web applications quickly and without sacrificing performance.
The mod_perl Developer's Cookbook teaches... |  |  Historical Information Science: An Emerging UnidisciplineIt suggests that trends in information retrieval, research, and teaching using modern information technology point toward a unidisciplinary field, Historical Information Science, which potentially can grow out of older quantification and Social Science history, the interplay between History and Information Science, and new methodologies and... |  |  |
|
Result Page: Previous 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Next |