Suche einschränken:
Zur Kasse

903 Ergebnisse - Zeige 21 von 40.

Writing Excel Macros with VBA

Roman, Steven
Writing Excel Macros with VBA
Newly updated for Excel 2002, Writing Excel Macros with VBA, 2nd Edition provides Excel power-users, as well as programmers who are unfamiliar with the Excel object model, with a solid introduction to writing Visual Basic for Applications (VBA) macros and programs for Excel. In particular, the book focuses on: * The Visual Basic Editor and the Excel VBA programming environment. Excel features a complete, state-of-the-art integrated development...

Perl in a Nutshell

Patwardhan, Nathan / Siever, Ellen / Spainhour, Stephen
Perl in a Nutshell
This complete guide to the Perl programming language ranges widely through the Perl programmer's universe, gathering together in a convenient form a wealth of information about Perl itself and its application to CGI scripts, XML processing, network programming, database interaction, and graphical user interfaces. The book is an ideal reference for experienced Perl programmers and beginners alike.With more than a million dedicated programmers, ...

Network Security Hacks

Lockhart, Andrew
Network Security Hacks
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-base...

Beautiful Security

Oram, Andy / Viega, John
Beautiful Security
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Beautiful Security explores this challenging subject with insightful essays and analysis on topics...

Understanding MySQL Internals

Pachev, Sasha
Understanding MySQL Internals
Although MySQL's source code is open in the sense of being publicly available, it's essentially closed to you if you don't understand it. In this book, Sasha Pachev -- a former member of the MySQL Development Team -- provides a comprehensive tour of MySQL 5 that shows you how to figure out the inner workings of this powerful database. You'll go right to heart of the database to learn how data structures and convenience functions operate, how t...

XSLT

Tidwell, Doug
XSLT
After years of anticipation and delay, the W3C finally released the XSLT 2.0 standard in January 2007. The revised edition of this classic book offers practical, real-world examples that demonstrate how you can apply XSLT stylesheets to XML data using either the new specification, or the older XSLT 1.0 standard. XSLT is a critical language for converting XML documents into other formats, such as HTML code or a PDF file. With XSLT, you get a t...

Essential CVS

Vesperman, Jennifer
Essential CVS
This easy-to-follow reference shows a variety of professionals how to use the Concurrent Versions System (CVS), the open source tool that lets you manage versions of anything stored in files. Ideal for software developers tracking different versions of the same code, this new edition has been expanded to explain common usages of CVS for system administrators, project managers, software architects, user-interface (UI) specialists, graphic desig...

Hardening Cisco Routers

Akin, Thomas
Hardening Cisco Routers
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is ...

J2me in a Nutshell

Topley, Kim
J2me in a Nutshell
To the experienced Java developer, J2ME (the Java 2 Micro Edition) looks just familiar enough to be tempting, but just different enough to warrant caution. J2ME in a Nutshellprovides the extra security you need when venturing into programming for cell phones, PDAs and other consumer electronic devices. It gives you the reference material you need for J2ME, together with a tutorial that leverages your existing knowledge and teaches you what is ...

Web Performance Tuning

Killelea, Patrick
Web Performance Tuning
As long as there's been a Web, people have been trying to make it faster. The maturation of the Web has meant more users, more data, more features, and consequently longer waits on the Web. Improved performance has become a critical factor in determining the usability of the Web in general and of individual sites in particular.Web Performance Tuning, 2nd Edition is about getting the best possible performance from the Web. This book isn't just ...

Building iPhone Apps with Html, Css, and JavaScript

Stark
Building iPhone Apps with Html, Css, and JavaScript
Now Web designers and developers can join the iPhone app party without having to learn Cocoa's Objective-C programming language. Plenty of detailed examples, step-by-step instructions, and hands-on exercises help readers learn how to build iPhone apps.

Baseball Hacks

Adler, Joseph
Baseball Hacks
Baseball Hacks isn't your typical baseball book--it's a book about how to watch, research, and understand baseball. It's an instruction manual for the free baseball databases. It's a cookbook for baseball research. Every part of this book is designed to teach baseball fans how to do something. In short, it's a how-to book--one that will increase your enjoyment and knowledge of the game. So much of the way baseball is played today hinges upon...

Google Maps Hacks

Gibson, Rich / Erle, Schuyler
Google Maps Hacks
Want to find every pizza place within a 15-mile radius? Where the dog parks are in a new town? The most central meeting place for your class, club or group of friends? The cheapest gas stations on a day-to-day basis? The location of convicted sex offenders in an area to which you may be considering moving? The applications, serendipitous and serious, seem to be infinite, as developers find ever more creative ways to add to and customize the sa...