Home | Amazing | Today | Tags | Publishers | Years | Search 
Using Microsoft Access 2010
Using Microsoft Access 2010

This book is for anyone comfortable using a personal computer who needs to collect and manipulate information. Experience with Microsoft Access 2010 or an earlier version of Access is helpful, but not necessary. The book takes the user from the basic techniques on how to use Microsoft Access 2010 to a strong...

Node Web Development
Node Web Development

Welcome to the world of developing web software using Node (also known as Node.js). Node is a newly-developed software platform that liberates JavaScript from the web browser, enabling it to be used as a general software development platform in server-side applications. It runs atop the ultra-fast JavaScript engine from the Chrome browser,...

Enterprise, Business-Process and Information Systems Modeling: 12th International Conference
Enterprise, Business-Process and Information Systems Modeling: 12th International Conference

This book contains the proceedings of two long-running events held in connection to the CAiSE conferences relating to the areas of enterprise, business-process and information systems modeling:

• The 12th International Conference on Business Process Modeling, Development and Support (BPMDS 2011) • The 16th...

BGP
BGP

This is a book about connecting to the Internet as reliably as possible. This means eliminating all single points of failure,including having just one Internet service provider (ISP). By multihoming to two or more ISPs,you can remain connected when either ISP (or your connection to them) experiences problems. However,there...

Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Essentials of Computer Architecture
Essentials of Computer Architecture

This book began when I was assigned to help salvage an undergraduate computer organization course. The course had suffered years of neglect: it had been taught by a series of professors, mostly visitors, who had little or no interest or background in digital hardware, and the curriculum had deteriorated to a potpourri of topics that...

The Templar Code For Dummies
The Templar Code For Dummies

A captivating look into the society of the Knights Templar

Brought to you by the author of Freemasons For Dummies, The Templar Code is more than an intriguing cipher or a mysterious symbol – it is the Code by which the Knights Templar lived and died, the Code that bound them together in secrecy, and the Code...

Getting Started with the Internet of Things: Connecting Sensors and Microcontrollers to the Cloud
Getting Started with the Internet of Things: Connecting Sensors and Microcontrollers to the Cloud

What is the Internet of Things? It's billions of embedded computers, sensors, and actuators all connected online. If you have basic programming skills, you can use these powerful little devices to create a variety of useful systems—such as a device that waters plants when the soil becomes dry. This hands-on guide...

Mobile Opportunistic Networks: Architectures, Protocols and Applications
Mobile Opportunistic Networks: Architectures, Protocols and Applications

The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark?

Featuring the contributions of prominent researchers from academia and industry,...

Configuring Cisco Unified Communications Manager and Unity Connection: A Step-by-Step Guide (2nd Edition)
Configuring Cisco Unified Communications Manager and Unity Connection: A Step-by-Step Guide (2nd Edition)

On March 10, 1876, Alexander Graham Bell made the first successful telephone call. As with many things, the test was purely accidental. Graham spilled acid on his leg, and Watson, his assistant, heard his call for help through the telephone. So, what has changed over the last 129 years? It would be easier to discuss what hasn’t...

Beginning iOS Application Development with HTML and JavaScript (Wrox Programmer to Programmer)
Beginning iOS Application Development with HTML and JavaScript (Wrox Programmer to Programmer)
THE AMAZING SUCCESS OF THE IPHONE and iPad over the past four years has proven that application developers are now smack deep in a brave new world of sophisticated, multifunctional mobile applications. No longer do applications and various media need to live in separate silos. Instead, mobile web-based applications can bring...
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)

“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.”

—Vint Cerf, Internet pioneer

 

...
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy