Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
NTC's Pocket Dictionary of Words and Phrases : 12,000 Words, Idioms, and Phrasal Verbs for Travelers and Learners
NTC's Pocket Dictionary of Words and Phrases : 12,000 Words, Idioms, and Phrasal Verbs for Travelers and Learners
Containing 6000 basic words and 6000 common idioms and phrasal verbs, Spears's latest book will be in demand by ESL students, teachers, and foreigners traveling in the United States. A former linguistics professor, Spears has written or edited over 30 dictionaries, including NTC's Dictionary of American Slang and Colloquial Expressions, and is...
Windows XP For Dummies, 2nd Edition
Windows XP For Dummies, 2nd Edition
Covers the latest Windows XP updates including Service Pack 2

Fully revised to quickly answer your XP questions

You asked for more coverage of Outlook Express, scanning and faxing, CD burning, and more in Windows XP For Dummies — and we delivered! This updated edition is packed with answers to your Windows XP questions, from...

The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future
The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future

The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future presents an investigation into the rationale for ERP by raising key questions that managers should ask themselves prior to considering ERP, including processes that should be followed in planning when acquiring ERP.

It concentrates on the impact...

Mathematical Models of Spoken Language
Mathematical Models of Spoken Language
Humans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,...
Podcasting: Do It Yourself Guide
Podcasting: Do It Yourself Guide
It's your show, and you can do what you want

Got something to tell the world? Want unlimited listening options? Podcasting makes it happen. It's the hottest communication trend of the twenty-first century, and one of the first guys to jump on board is ready to get you started. Todd helps you choose software, subscribe to the best podcasts,...

Master Humphrey's Clock
Master Humphrey's Clock
THE reader must not expect to know where I live. At present, it is true, my abode may be a question of little or no import to anybody; but if I should carry my readers with me, as I hope to do, and there should spring up between them and me feelings of homely affection and regard attaching something of interest to matters ever so slightly connected...
Flash Application Design Solutions: The Flash Usability Handbook
Flash Application Design Solutions: The Flash Usability Handbook
Flash Application Design Solutions shows you how to harness the power of ActionScript 2.0 and make the most of the improved design tools of Flash 8 to create usable, intuitive Flash interfaces.

In this book, you'll find a number of concrete Flash usability solutions that use elements such as navigation menus, data filtering, forms,
...
Absolute Beginner's Guide to Microsoft Office Word 2003
Absolute Beginner's Guide to Microsoft Office Word 2003

Get up to speed on Word 2003's capabilities with concise, step-by-step tips from a Word expert!

Finally, readers without any Word experience have a book that was created just for them! This book is written for the reader who may be using Word for the very first time. Everything a reader needs to learn how...

Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Value-Based Software Engineering
Value-Based Software Engineering

The IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,...

Next Generation Network Services: Technologies & Strategies
Next Generation Network Services: Technologies & Strategies
'Next Generation' refers to the new technologies and services that telecommunications operators will have at their disposal as they create new 3G networks where voice and data converge and which are based on packet switched rather than circuit switched telephony.

Providing a much needed overview of the latest communication technologies
...
unlimited object storage image
Result Page: 1878 1877 1876 1875 1874 1873 1872 1871 1870 1869 1868 1867 1866 1865 1864 1863 1862 1861 1860 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy