Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Calculus
Advanced Calculus
New publisher! Corrected version! Demonstrating analytical and numerical techniques for attacking problems in the application of mathematics, this well-organized, clearly written text presents the logical relationship and fundamental notations of analysis. Buck discusses analysis not solely as a tool, but as a subject in its own right. This...
Kiplinger's Practical Guide to Your Money: Keep More of It, Make It Grow, Enjoy It, Protect It, Pass It on
Kiplinger's Practical Guide to Your Money: Keep More of It, Make It Grow, Enjoy It, Protect It, Pass It on
You don't need to know electrical theory to change a light bulb. Why should you need to know financial theory to make money-smart decisions?

You don't, says Ted Miller, editor of Kiplinger's Personal Finance Magazine. As a journalist with more than two decades of experience at the pioneer magazine of personal-finance journalism, Miller...

HTML Style Sheets Design Guide: The Web Professional's Guide to Building and Using Style Sheets
HTML Style Sheets Design Guide: The Web Professional's Guide to Building and Using Style Sheets
This outstanding guide takes you from the basic to advanced concepts of working with cascading style sheets, level 1 (CSS1). The writers assume that you're already comfortable with HTML and are ready to improve your Web site by adding style sheets.

The first part of the book provides an introduction to style sheets--the history of their...

Microsoft SQL Server 2008 A BEGINNER'S GUIDE 4/E
Microsoft SQL Server 2008 A BEGINNER'S GUIDE 4/E
There are a couple of reasons why SQL Server, the system that comprises Database Engine, Analysis Services, Reporting Services and Integration Services is the best choice for a broad spectrum of end users and database programmers building business applications:

SQL Server is certainly the best system for Windows operating systems,
...
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Engineering Distributed Objects
Engineering Distributed Objects
Wolfgang Emmerich Engineering Distributed Objects The pay-offs for creating distributed applications are in achieving portability, scalability and fault-tolerance. In order to simplify building software that performs robustly regardless of platform or network infrastructure, a new strata of 'middleware' has been created. This book provides a...
XNA 2.0 Game Programming Recipes: A Problem-Solution Approach (Books for Professionals by Professionals)
XNA 2.0 Game Programming Recipes: A Problem-Solution Approach (Books for Professionals by Professionals)
Join the game development revolution today! XNA greatly simplifies the development of your own games, lowering the barrier for programmers to get into game development. In XNA, you can start coding your games from the very start, a true revelation compared to other game programming environments. XNA doesn't sacrifice power for this ease of use - it...
DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
First book on the new generation of data warehouse architecture, DW 2.0--by the "father of the data warehouse".

Data Warehousing has been around for 20 years and has become part of the information technology infrastructure. Data warehousing originally grew in response to the corporate need for information--not
...
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology
    Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology
    Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology is a must-have book for anyone developing user interfaces (UI). The authors define a seemingly simple goal, the Cooperative Principle for Technology: "[T]hose who are designing, building, or managing the development of...
    Linux Security: Craig Hunt Linux Library
    Linux Security: Craig Hunt Linux Library
    Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

    This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

    FrontPage 2003 All-in-One Desk Reference For Dummies (Computer/Tech)
    FrontPage 2003 All-in-One Desk Reference For Dummies (Computer/Tech)

    Tips also work for FrontPage 2002 and 2000

    Your one-stop guide to creating great-looking Web sites with FrontPage 2003

    Ready to put the fun back into Web development and create a fantastic site? From building basic HTML pages to complex pages with Cascading Style Sheets, this one-stop guide to FrontPage 2003 covers it...

    Result Page: 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy