Home | Amazing | Today | Tags | Publishers | Years | Search 
Humane Interfaces (Human Factors in Information Technology)
Humane Interfaces (Human Factors in Information Technology)
Ever since the first successful International Cognitive Technology (CT) Conference in Hong Kong in August 1995, a growing concern about the dehumanising potential of machines, and the machining potential of the human mind, has pervaded the organisers' thinking. When setting up the agenda for the Second International CT Conference in Aizu, Japan, in...
RF Photonic Technology in Optical Fiber Links
RF Photonic Technology in Optical Fiber Links
RF photonic components, transmission systems, and signal processing examples in optical fibers are reviewed by leading academic, government, and industry scientists working in this field. This volume introduces various related technologies such as direct modulation of laser sources, external modulation techniques, and detectors. The text is aimed...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
QuickTime Toolkit Volume One: Basic Movie Playback and Media Types (QuickTime Developer Series)
QuickTime Toolkit Volume One: Basic Movie Playback and Media Types (QuickTime Developer Series)
"When QuickTime application developers get stuck, one of the first places they look for help is example code from the QuickTime Engineering team. Finally, these well-crafted examples and clear descriptions are available in book form-a must-have for anyone writing applications that import, export, display, or interact with QuickTime...
Pattern Matching Algorithms
Pattern Matching Algorithms
Issues of matching and searching on elementary discrete structures arise pervasively in computer science and many of its applications, and their relevance is expected to grow as information is amassed and shared at an accelerating pace. Several algorithms were discovered as a result of these needs, which in turn created the subfield of Pattern...
Mastering Microsoft SQL Server 2005
Mastering Microsoft SQL Server 2005

The Comprehensive Resource for SQL Server 2005 Administrators, Consultants, and Developers

Whether you're a systems administrator, database application developer, or IT consultant, you'll quickly ratchet up your knowledge of Microsoft SQL Server 2005 with this thorough and comprehensive guide. Light...

Network Design: Principles and Applications
Network Design: Principles and Applications
NETWORK DESIGN IS A COMPLEX PROCESS, requiring knowledge of several disciplines to include engineering, financial analysis, and computer science. Although the network design process was never simple, advances in technology and the introduction of new networking communications facilities and products resulted in a difficult endeavor becoming more...
Securing Citrix XenApp Server in the Enterprise
Securing Citrix XenApp Server in the Enterprise
Secure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features
...
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)

It's hard to remember a world without the Internet. We now take for granted that we can access our bank accounts and health records, get driving directions, talk to friends, and shop, all on the Internet. Many companies couldn't survive without it because it is their link to their customers.

But the...

Excel 2003 Just the Steps For Dummies (Computer/Tech)
Excel 2003 Just the Steps For Dummies (Computer/Tech)
Easy steps for creating spreadsheets you can really use

Simple steps...

...for great results

Use AutoOutline

  1. Choose Data Group and Outline AutoOutline. Figure 11-9 illustrates a worksheet with outline...
How to Do Everything with Microsoft Office Word 2007
How to Do Everything with Microsoft Office Word 2007
We're getting the word out on how to get the most out of Word 2007

This up-to-date guide makes it easy for both beginners and experienced users to master the powerful features and new interface of Word 2007. You will learn to create professional-looking documents effortlessly. Practical examples and step-by-step...

46 Science Fair Projects for the Evil Genius
46 Science Fair Projects for the Evil Genius
SHAKE UP YOUR SCIENCE FAIR WITH THESE CUTTING-EDGE, ATTENTION-GRABBING PROJECTS!

Want to win first place in the next science fair? 46 Science Fair Projects for the Evil Genius has everything you need to create amazing, sophisticated projects that will wow the judges and keep everyone talking long after the awards are...

Result Page: 669 668 667 666 665 664 663 662 661 660 659 658 657 656 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy