BlackBerry Pearl For Dummies (Computer/Tech) Manage your contacts, appointments, e-mail, and media
Find out how to do a string of things with your BlackBerry Pearl!
It's a fact — your BlackBerry Pearl can do almost anything except bake a pie — but you can use it to e-mail a recipe!
eBay Listings That Sell For Dummies (Computer/Tech)
Discover the tricks top sellers use to grab attention
Create your own unique eBay selling pages with time-tested techniques
So you know your way around eBay, but you're not getting the highest bids for your items? Maybe your listings need a makeover! Here are all the...
Network+ Exam Prep 2 (Exam Prep N10-003)
Attention Network+ Candidates: Stop spending valuable study time sorting through confusing study aids. Network + Exam Prep 2 is the ultimate self-study guide for the Network + exam. Featuring exercises, self-assessments, study strategies, exam tips and notes, this comprehensive guide will help you understand the concepts behind...
Encyclopedia of Civil War Shipwrecks On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,... Faster Smarter A+ Certification
Take the next step in your career by earning your CompTIA A+ certification the faster, smarter way. This innovative, high-energy guide makes the most of your study time by teaching exactly what you need for the A+ Core Hardware and Operating Systems Technologies exams. You get focused, no-fluff coverage of exam objectives—plus Test Smart...
eBay For Dummies (Computer/Tech)
Buy low, sell high, and join the eBay community
Economy shopper or entrepreneur — discover the secrets to eBay success!
The bucks start here! Whether you're saving them or earning them, eBay's the place, and Marsha Collier is the person to show you how. Get...
The Economics of Information Security and Privacy
In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and...
|Result Page: 5 4 3 2 1 |