Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning PivotTables in Excel 2007: From Novice to Professional
Beginning PivotTables in Excel 2007: From Novice to Professional
Beginning PivotTables in Excel 2007 explains what Pivot Tables are, how you can benefit from using them, how to create them and modify them, and how to use their enhanced features. Using a Pivot Table in Microsoft Office Excel 2007 is a quick and exciting way to slice and dice a large amount of data.
  • Carefully explains the...
Immunology and Evolution of Infectious Disease
Immunology and Evolution of Infectious Disease

From HIV to influenza, the battle between infectious agents and the immune system is at the heart of disease. Knowledge of how and why parasites vary to escape recognition by the immune system is central to vaccine design, the control of epidemics, and our fundamental understanding of parasite ecology and evolution. As the first comprehensive...

2007 Microsoft  Office System Inside Out
2007 Microsoft Office System Inside Out
Learn everything you need to know for working with the 2007 Microsoft Office system--from the inside out! This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds for using the 2007 release of Microsoft Office--all in concise, fast-answer format. Whether you are upgrading from Office 97 or Office 2003, you'll be...
JBoss Tools 3 Developers Guide
JBoss Tools 3 Developers Guide
JBoss Tools consist of the best Java frameworks and technologies placed together under the same "roof". Discovering JBoss Tools is like exploring a cave; at first everything seems unknown and complicated, but once you become familiar with the main features of the Tools, you will start to feel at home.

This is the first book in
...
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Building and Testing with Gradle
Building and Testing with Gradle

This book has a very clear aim: introduce you to the incredible simplicity and power of Gradle.

Gradle is a flexible yet model-driven JVM-based build tool. Gradle acknowledges and improves on the very best ideas from Make, Ant, Ivy, Maven, Rake, Gant, Scons, SBT, Leinengen, and Buildr. The best-of-breed features previously...

Automated Software Testing: Introduction, Management, and Performance: Introduction, Management, and Performance
Automated Software Testing: Introduction, Management, and Performance: Introduction, Management, and Performance
Automated Software Testing addresses the challenge for today’s software professionals who are faced with real schedule deadlines and need to introduce, manage, and perform automated testing on a project. The book addresses automated testing within a client-server or Web environment.

The focus of this book is
...
Java Threads and the Concurrency Utilities
Java Threads and the Concurrency Utilities

This concise book empowers all Java developers to master the complexity of the Java thread APIs and concurrency utilities. This knowledge aids the Java developer in writing correct and complex performing multithreaded applications.

Java's thread APIs and concurrency utilities are among its most powerful and challenging...
The Complete New Manager
The Complete New Manager

Tackle every management challenge with skill and confidence!

Managers are faced with a variety of challenges every day. There are decisions to make, conflicts to resolve, and strategies to implement, among many other responsibilities. As a new manager you need to build the skills necessary for tackling problems head-on.

...
Native Docker Clustering with Swarm
Native Docker Clustering with Swarm

Key Features

  • Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
  • Optimize Swarm and SwarmKit features for scaling massive applications through containers.
  • Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
  • ...
UNIX to Linux(R) Porting : A Comprehensive Reference (Prentice Hall Open Source Software Development)
UNIX to Linux(R) Porting : A Comprehensive Reference (Prentice Hall Open Source Software Development)

Port Your UNIX® Applications to Linux®–Quickly, Efficiently, and Reliably

Increasingly, developers, architects, and project managers face the challenge of porting their C, C++, and Java applications from UNIX® to Linux® environments. Now,...

Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates
Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates
PEERS, PIRATES, AND PERSUASION: RHETORIC IN THE PEER-TO-PEER DEBATES investigates the role of rhetoric in shaping public perceptions about a novel technology: peer-to-peer file-sharing networks. While broadband Internet services now allow speedy transfers of complex media files, Americans face real uncertainty about whether peer-to-peer file...
unlimited object storage image
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy