Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering Perl/Tk
Mastering Perl/Tk
Perl/Tk is the marriage of the Tk graphical toolkit with Perl, the powerful programming language used primarily for system administration, web programming, and database manipulation. With Perl/Tk, you can build Perl programs with an attractive, intuitive GUI interface with all the power of Perl behind it. Mastering Perl/Tk is the...
ASP.NET Bible
ASP.NET Bible
The Internet revolution of the late 1990s represented a dramatic shift in the way
individuals and organizations communicate with each other. Traditional applications,
such as word processors and accounting packages, are modeled as stand-alone
applications: they offer users the capability to perform tasks using data stored on the...
Flash MX Bible
Flash MX Bible
Macromedia Flash MX is the professional standard authoring tool for producing high-impact
Web experiences. Whether you are creating animated logos, Web site navigation controls,
long-form animations, entire Flash Web sites, or Web applications, you’ll find the power and
flexibility of Flash ideal for your own creativity....
Adobe Premiere 6 Bible
Adobe Premiere 6 Bible
If Adobe Premiere 6 can do it, you can do it too … Packed with hands-on tutorials and illuminating examples, this comprehensive guide delivers all the know-how you need to edit, create special effects, and output professional-quality digital video with Adobe Premiere. From video capture and editing basics to transitions, type,...
3ds max 6 Bible
3ds max 6 Bible
Whenever I withdrew to the computer room, my wife would say that I was off to my “fun and games.” I would flatly deny this accusation, saying that it was serious work that I was involved in. But later, when I emerged with a twinkle in my eye and excitedly asked her to take a look at my latest rendering, I knew that she was right....
Optical Switching  and Networking Handbook
Optical Switching and Networking Handbook
Before you begin to read this book, please take a moment to read these introductory comments. The title of the book may be misleading for many people:

For the engineering person, this may sound like the bible of optical networks and switching systems. Not so! This is not an engineering book and will not dig into the gory details of bits
...
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Microsoft Project 2007 Bible
Microsoft Project 2007 Bible
Take control of your projects with this in-depth guide

Whether you're managing a project for a small team or supervising a corporate assignment involving hundreds, the power of Microsoft Project 2007 and the detailed information in this comprehensive guide can keep you on track. From setting budgets to allocating resources...

Powering Office 2003 with XML (Power Pack Series)
Powering Office 2003 with XML (Power Pack Series)
Find out how to
  • Understand XML specification and schemas
  • Set up and complete InfoPathTMВ forms
  • Design new forms from XML data files
  • Debug InfoPath scripts
  • Tackle real-world problems with the help of case studies
  • ...
Ubuntu Linux Bible
Ubuntu Linux Bible
Everything you need to know—and then some!

It's the fastest-growing, coolest Linux distribution out there, and now you can join the excitement with this information-packed guide. Want to edit graphics? Create a spreadsheet? Manage groups? Set up an NFS server? You'll learn it all and more with the expert guidance,...

Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

.Mac with iWeb, Second Edition (Visual QuickStart Guide)
.Mac with iWeb, Second Edition (Visual QuickStart Guide)
Need to learn what’s new in .Mac fast? Try a Visual QuickStart!

This best-selling reference’s visual format and step-by-step, task-based instructions will have you up and running with .Mac in no time. In this completely updated edition of our best-selling guide to .Mac leading software application expert
...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy