Mostrando 31,161 - 31,180 Resultados de 32,316 Para Buscar '"The Powers That Be"', tiempo de consulta: 0.14s Limitar resultados
  1. 31161
    por King, Myke, 1951-
    Publicado 2017
    “…It will be of great interest to those in the oil and gas, chemical, pulp and paper, water purification, pharmaceuticals and power generation industries, as well as for design engineers, instrument engineers and process technical support…”
    Libro electrónico
  2. 31162
    Publicado 2011
    “…This unique book provides a fully revised and up-to-date treatment of the TTCN-3 language TTCN-3 is an internationally standardised test language with a powerful textual syntax which has established itself as a global, universal testing language. …”
    Libro electrónico
  3. 31163
    Publicado 2010
    “…This fully updated edition shows how to make the most of C# 4.0’s new features and programming patterns to write code that is simple, yet powerful. This edition contains two new chapters on parallel programming, multi­threading, and concurrency, as well as extensive coverage of new C# 4.0 features: dynamic typing, variance, optional/named parameters, and many other new topics. …”
    Libro electrónico
  4. 31164
    Publicado 2013
    “…Intended for intermediate-to-advanced-level SQL Server professionals, it focuses on the product’s most complex and powerful capabilities, and its newest tools and features. …”
    Libro electrónico
  5. 31165
    Publicado 2015
    “…All of these enhancements provide developers with a lot of power in one solution. In previous Professional DotNetNuke books, DotNetNuke founder Shaun Walker authored a popular introductory chapter covering the evolution of the DNN open source project. …”
    Libro electrónico
  6. 31166
    Publicado 2015
    “…What You Will Learn Install and configure MariaDB Create databases, tables, and indexes Import and export data from and to external files Work with views and virtual columns Create, read, update, and delete records in your database Use dynamic columns Set up a powerful full-text search system Access your external data from MariaDB through the CONNECT engine In Detail This book will take you through all the nitty-gritty parts of MariaDB, right from the creation of your database all the way to using MariaDB's advanced features. …”
    Libro electrónico
  7. 31167
    por Claude, Sandrine
    Publicado 2021
    “…The Château de Gréoux-les-Bains was built in the heart of Provence on a site which had been used from early Roman times for its hot springs. The castle’s powerful outline dominates the village whose organisation and architecture has preserved evidence of its development from the Middle Ages to the modern period. …”
    Electrónico
  8. 31168
    Publicado 2023
    “…Combined, we share with you knowledge that is powerful, practical, and thought-provoking. This book is a collection of 32 chapters representing a host of different voices. …”
    Libro electrónico
  9. 31169
    por Fried, Johannes
    Publicado 2007
    “…Der Band enthält im Anhang alle relevanten Texte im Original und in englischer Übersetzung The Donation of Constantine is the most outrageous and powerful forgery in world history. The question of its precise time of origin alone kept generations of researchers occupied. …”
    Libro electrónico
  10. 31170
    Publicado 2024
    “…And he shows us that, more powerfully than abstract ideas, governmental edicts or technological forces, stories reveal the infinite discoveries to be made in humans' relationship to nature - in beautiful landscapes where danger lurks as well as in visions and behaviours that change the world and ecosystems. …”
    Libro electrónico
  11. 31171
    Publicado 2002
    “…These factors combined make this the one reference that every developer and system administrator should have. .NET Framework Security provides An extensive introduction to explanation of Code Access Security, the powerful new security system shipping in the .NET Framework Information on how to write and test safe applications using the .NET Framework Extensive coverage on how to effectively administer .NET Framework security In-depth introduction to the cryptography library shipping in the .NET Framework, including an introduction to XML digital signatures An overview of all of the new security features available in .NET Code samples that can be used to implement security on your own Web site or application Step-by-step guidelines for modifying the various configuration files associated with .NET, and an explanation of the elements involved Instructions for all of the aspects of security in the CLR and what it means How to use ASP.NET to create a secure application Explanations for using the CryptoAPI libraries to create your own custom functionality Guidelines on how to create secure network applications as well as applications that exist on the Internet Detailed examples of how to establish security parameters in IIS that relate to ASP.NET Instructions for administering .NET applications hosted in IE 067232184XB04232002…”
    Libro electrónico
  12. 31172
    Publicado 2007
    “…It’s about great companies like IDEO and IKEA ® , Commerce Bank and Costco ® , Wegmans and Whole Foods ® : how they earn the powerful loyalty and affection that enables truly breathtaking performance. …”
    Libro electrónico
  13. 31173
    por Hawkins, Scott
    Publicado 2002
    “…Whether you're a sysadmin, developer, power user, or newbie, get the most convenient, up-to-date Linux reference you can buy: Linux Desk Reference, Second Edition ! …”
    Libro electrónico
  14. 31174
    Publicado 2004
    “…New in this edition: Comprehensive coverage of Linux shell programming with bash Shell Programming QuickStart: makes first-time shell programmers productive in just 15 pages Complete, practical debugging chapter Updated coverage of the latest UNIX and GNU/Linux versions of awk, sed, and grep Shell programming for sysadmins: walks you through key UNIX and Linux system shell scripts Completely updated: Shell programming fundamentals: what shells are, what they do, how they work Choosing the right shell for any application Nearly 50,000 UNIX/Linux sysadmins, developers, and power users have used previous editions of UNIX Shells by Example to become expert shell programmers. …”
    Libro electrónico
  15. 31175
    por Jurgensen, Timothy M.
    Publicado 2002
    “…Whether you're an IT manager, corporate security officer, product manager, developer, or integrator, Smart Cards: A Developer's Toolkit gives you a powerful new weapon for protecting your digital assets…”
    Libro electrónico
  16. 31176
    Publicado 2008
    “…They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. …”
    Libro electrónico
  17. 31177
    por Yuan, Feng
    Publicado 2001
    “…Coverage includes: Uncovering the Windows system architecture and graphics system internal data structure Building graphics API "spies" that show what's going on "under the hood" Detecting GDI resource leaks and other powerful troubleshooting techniques Expert techniques for working with the Win32 GDI and DirectDraw APIs Device context, coordinate space and transformation, pixels, lines, curves, and area fills Bitmaps, image processing, fonts, text, enhanced metafiles, printing, and more Windows Graphics Programming delivers extensive code, practical techniques, and unprecedented insight—plus an exclusive CD-ROM containing original system-level tools, kernel mode drivers, sample code, and generic C++ classes for Windows graphics programming without MFC. …”
    Libro electrónico
  18. 31178
    Publicado 2004
    “…Find out how with this essential reference, and quickly learn how to harness the significant power of this new framework…”
    Libro electrónico
  19. 31179
    por Reilly, David
    Publicado 2002
    “…You will learn to maximize the API structure through in-depth coverage of: The architecture of the Internet and TCP/IP Java’s input/output system How to write to clients and servers using the User Datagram Protocol (UDP) and TCP The advantages of multi-threaded applications How to implement network protocols and see examples of client/server implementations HTTP and how to write server-side Java applications for the Web Distributed computing technologies such as Remote Method Invocation (RMI) and CORBA How to access e-mail using the extensive and powerful JavaMailTM API This book’s coverage of advanced topics such as input/output streaming and multi-threading allows even the most experienced Java developers to sharpen their skills. …”
    Libro electrónico
  20. 31180
    por Beck, Kent
    Publicado 2003
    “…With its emphasis on agile methods and fast development strategies, Test-Driven Development is sure to inspire readers to embrace these under-utilized but powerful techniques. 0321146530B10172002…”
    Libro electrónico