Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
e-Learning and Social Networking Handbook: Resources for Higher Education
e-Learning and Social Networking Handbook: Resources for Higher Education

Student engagement with digital learning resources and online social networking are strong forces in education today. How can these resources best be utilized by educators and course designers in higher education? This book aims to provide the reader with enough background information to appreciate the value of social networking, especially...

C Programming - A Beginner's Course
C Programming - A Beginner's Course
Comments posted online for C Programming – A Beginner's Course: "The text does a great job of explaining concepts and the examples are pretty good." "It covers a lot of ideas and concepts that are left out of the other beginner books." "This book does such a good job at explaining the fundamentals of the...
Perfect Pan Pizza: Square Pies to Make at Home, from Roman, Sicilian, and Detroit, to Grandma Pies and Focaccia [A Cookbook]
Perfect Pan Pizza: Square Pies to Make at Home, from Roman, Sicilian, and Detroit, to Grandma Pies and Focaccia [A Cookbook]
An in-depth guide to pan pizza from baking authority Peter Reinhart, including achievable recipes for making Detroit-, Sicilian-, and Roman-style pan pizzas and focaccias in a home oven.

NAMED ONE OF THE BEST COOKBOOKS OF THE YEAR BY FOOD NETWORK

This new book from bread legend
...
Visual C++ 6: The Complete Reference
Visual C++ 6: The Complete Reference
This book opens with a tour of how to use the sixth version of Microsoft's compiler. The author surveys the compiler's features and tools (including a reference to every available menu option) and discusses the basics of installing it and getting it up and running.

Next the authors introduce the basics of the C and C++ programming languages....

Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

SQL In A Nutshell, 2nd Edition
SQL In A Nutshell, 2nd Edition
This essential desktop reference drills down and documents every SQL command and how to use it in both commercial (Oracle, DB2, and Microsoft SQL Server) and open source implementations (PostgreSQL, and MySQL). It includes the command syntax (by vendor, if the syntax differs across implementations), a description, and practical examples. And...
Pragmatic ADO.NET: Data Access for the Internet World
Pragmatic ADO.NET: Data Access for the Internet World

"This is my favorite book on ADO.NET. The author clearly has an extensive understanding of the subject matter. It is useful not only for expert data access programmers but also for weekend code warriors."
—Glenn Thimmes, Senior Software Engineer, New Dawn Technologies.Formerly Develop Support Engineer (WebData),
...

Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
Escape From Excel Hell: Fixing Problems in Excel 2003, 2002 and 2000 (Mr. Spreadsheet's Bookshelf)
When Excel talks back to you, here's what to do

You try to open a spreadsheet and Excel won't let you, because there's a macro involved. You cannot convince the software that the macro is safe. You hurl something across the room.

Grab this book instead! You'll find more than 200 fixes for things...

Software Architecture Design Patterns in Java
Software Architecture Design Patterns in Java
 Partha Kuchana is an experienced enterprise systems architect. He understands that patterns are not about things that are just good ideas, but that patterns are about capturing knowledge bred from experience. This hard-won knowledge is what Partha is sharing with readers of his book. Here are some of the things I really like about what he has...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Oracle Data Warehousing and Business Intelligence Solutions
Oracle Data Warehousing and Business Intelligence Solutions
Up-to-date, comprehensive coverage of the Oracle database and business intelligence tools

Written by a team of Oracle insiders, this authoritative book provides you with the most current coverage of the Oracle data warehousing platform as well as the full suite of business intelligence tools. You'll learn how to...

Artificial Intelligence and Symbolic Computation: 7th International Conference, AISC 2004, Linz, Austria, September 22-24, 2004.
Artificial Intelligence and Symbolic Computation: 7th International Conference, AISC 2004, Linz, Austria, September 22-24, 2004.
This book constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Symbolic Computation, AISC 2004, held in Linz, Austria in September 2004.

The 17 revised full papers and 4 revised short papers presented together with 4 invited papers were carefully reviewed and selected for inclusion in the book....

unlimited object storage image
Result Page: 593 592 591 590 589 588 587 586 585 584 583 582 581 580 579 578 577 576 575 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy