Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning VB .NET 1.1 Databases: From Novice to Professional
Beginning VB .NET 1.1 Databases: From Novice to Professional

Visual Basic .NET is a powerful .NET programming language that is often considered the “workhorse” of programming. Further, development in VB .NET accounts for a huge portion of all programming efforts. To understand VB .NET is to meet challenging programming projects head-on.

Author Dan Maharry livens...

Becoming a Strategic Leader: Your Role in Your Organization's Enduring Success (J-B CCL (Center for Creative Leadership))
Becoming a Strategic Leader: Your Role in Your Organization's Enduring Success (J-B CCL (Center for Creative Leadership))
Praise for Becoming a Strategic Leader

"If you manage anything of importance—from a company to a functional area—read this book, and share it with your team. You'll dog-ear plenty of pages and blow away your previous performance."
—Steve Wigginton, executive vice president,
...

Guide to RISC Processors: for Programmers and Engineers
Guide to RISC Processors: for Programmers and Engineers
Popular processor designs can be broadly divided into two categories: Complex Instruction
Set Computers (CISC) and Reduced Instruction Set Computers (RISC). The dominant
processor in the PC market, Pentium, belongs to the CISC category. However, the recent
trend is to use the RISC designs. Even Intel has moved from CISC to RISC
...
Advanced .NET Remoting, Second Edition
Advanced .NET Remoting, Second Edition

With the arrival of .NET remoting, any programmer who wants to work with distributed objects can benefit from Advanced .NET Remoting, a solid tour of basic and expert techniques for working with distributed code on Microsoft's newest platform.

This title's concise, code-centered approach, backed up by judicious...

Brute Force: Cracking the Data Encryption Standard
Brute Force: Cracking the Data Encryption Standard
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved...
The Zen of CSS Design : Visual Enlightenment for the Web (Voices That Matter)
The Zen of CSS Design : Visual Enlightenment for the Web (Voices That Matter)

Proving once and for all that standards-compliant design does not equal dull design, this inspiring tome uses examples from the landmark CSS Zen Garden site as the foundation for discussions on how to create beautiful, progressive CSS-based Web sites. By using the Zen Garden sites as examples of how CSS design techniques and...

Making Sense of Motherhood: A Narrative Approach
Making Sense of Motherhood: A Narrative Approach
Becoming a mother changes lives in many ways, and this book explores how women try to make sense of, and narrate their experiences of, first-time motherhood in industrialized society. It charts the social, cultural and moral contours of contemporary motherhood and engages with sociological and feminist debates on how selves are constituted,...
Evolutionary Synthesis of Pattern Recognition Systems (Monographs in Computer Science)
Evolutionary Synthesis of Pattern Recognition Systems (Monographs in Computer Science)
Designing object detection and recognition systems that work in the real world
is a challenging task due to various factors including the high complexity of
the systems, the dynamically changing environment of the real world and
factors such as occlusion, clutter, articulation, and various noise contributions
that make the
...
Adaptable and Adaptive Hypermedia Systems
Adaptable and Adaptive Hypermedia Systems
Hypermedia systems may be one of the most significant contributions to the Internet in recent years. This powerful new technology has revolutionized the delivery of e-content through the Internet. However, as the needs of users have changed, the hypermedia systems...
High Availability Scenarios With IBM Tivoli Workload Scheduler And IBM Tivoli Framework
High Availability Scenarios With IBM Tivoli Workload Scheduler And IBM Tivoli Framework
This Redbook explains how to implement IBM Tivoli Workload Scheduler within a high availability environment, as well as how to design and create a Tivoli Framework environment.

In this IBM Redbook, we show you how to design and create highly available IBM Tivoli Workload Scheduler and IBM Tivoli Management Framework (TMR server, Managed...

Which Rights Should Be Universal?
Which Rights Should Be Universal?
"We hold these truths to be self-evident..." So begins the U.S. Declaration of Independence. What follows those words is a ringing endorsement of universal rights, but it is far from self-evident. Why did the authors claim that it was? William Talbott suggests that they were trapped by a presupposition of Enlightenment philosophy: That...
Buying & Selling Jewelry on eBay (Buying & Selling on Ebay)
Buying & Selling Jewelry on eBay (Buying & Selling on Ebay)
In recent years, U.S. jewelry sales on the Internet have grown to nearly $3 billion yearly, a figure attained in part because of the popularity of eBay. "Buying & Selling Jewelry on eBay" walks you through the process of using eBay to both purchase and purvey jewelry-from finding the perfect gem and the right style of jewelry to...
Result Page: Previous 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy