Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia-based Instructional Design: Computer-Based Training; Web-Based Training; Distance Broadcast Training; Performance-Based Solutions, Second Edition
Multimedia-based Instructional Design: Computer-Based Training; Web-Based Training; Distance Broadcast Training; Performance-Based Solutions, Second Edition
A New Edition of the Book that Turned the Training World Upside Down

Just as the groundbreaking first edition of Multimedia-Based Instructional Design offered a complete guide to designing and developing interactive multimedia training, the second edition is filled with relevant new content, automated tools on the CD-ROM, updates on standards,...

The Book of VMware: The Complete Guide to VMware Workstation
The Book of VMware: The Complete Guide to VMware Workstation

There's only so much you can do by multitasking applications. Frequently, you just need another computer for testing software, trying out network configurations, or doing any of a dozen things that engineers and administrators need to do. VMware allows you to run several virtual machines on one physical computer, each completely...

Oracle Insights: Tales of the Oak Table
Oracle Insights: Tales of the Oak Table
OvER THE PAST fifteen years I have worked for Oracle Corporation, and with many customers who were keen to find the limitations of the (then) current Oracle database on the latest and greatest hardware platforms of the day.

These customers have demanded ever increasing database performance at what seems a
...
Six Sigma Business Scorecard : Creating a Comprehensive Corporate Performance Measurement System
Six Sigma Business Scorecard : Creating a Comprehensive Corporate Performance Measurement System
Ensuring growth and profitability through performance

 

PLAN * IMPLEMENT * MEASURE * ADJUST * PROFIT

 

"Great book! The readers should keep their highlighters handy for they will find many points that they will want to remember." -- H. James Harrington, Ph.D., Author of Business
...
SEO Warrior
SEO Warrior

I was compelled to write SEO Warrior for many reasons. Every day, thousands of sites are born in the hopes of making it big. Most of them will fail before achieving their goals. Many site owners create their sites blindly, without conducting proper research. Many site owners do not even know what search engine optimization (SEO) is and what its...

MacIntosh Technology in the Common Hardware Reference Platform
MacIntosh Technology in the Common Hardware Reference Platform
This book presents specifications and standards for the Apple Macintosh technology cited in the PowerPC Microprocessor Common Hardware Reference Platform (CHRP) specification.

The CHRP specification is a joint publication of Apple Computer, Inc., International Business Machines Corporation, and Motorola, Inc. It defines a common hardware
...
Quartz 2D Graphics for Mac OS X(R) Developers
Quartz 2D Graphics for Mac OS X(R) Developers
On Mac OS X, Macintosh developers depend on the graphics and imaging frameworks of the Core Graphics system to implement multimedia features in their applications. With Core Graphics Apple has answered the increasing demands of graphics developers with a powerful collection of tools, including Quartz 2D and Core Image. Quartz 2D is a modern drawing...
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Linux Applications on Pseries
Linux Applications on Pseries
The strengths of the AIX operating system are well known among in the UNIX software community. Its reliability and great degree of scaling make AIX the perfect choice for hosting mission-critical applications. It is a robust and flexible operating system that meets all the requirements for the various demands of e-business environments. At the same...
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy