Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Outlook 2010 Step by Step
Microsoft Outlook 2010 Step by Step

Bill Gates’s dream of “a computer on every desktop” is becoming more and more of a reality—many people today work (and play) on computers both in the office and at home. But desktop computers are even becoming a thing of the past. Laptops, netbooks, and other portable computers, as well as Windows Mobile devices,...

Obstruction of Justice: How the Deep State Risked National Security to Protect the Democrats
Obstruction of Justice: How the Deep State Risked National Security to Protect the Democrats
Investigative reporter Luke Rosiak is being hailed as “one of the smartest, most diligent reporters in Washington” (TUCKER CARLSON) and “a bulldog” (DANA LOESCH) for uncovering “what is possibly the largest scandal and coverup in the history of the United States House of Representatives” (NEWT...
Semantic-Based Visual Information Retrieval
Semantic-Based Visual Information Retrieval
Content-based visual information retrieval (CBVIR) is one of the most interesting research topics in the last years for the image and video community. With the progress of electronic equipment and computer techniques for visual information capturing and processing, a huge number of image and video records have been collected. Visual information...
Garbage and Recycling (Introducing Issues With Opposing Viewpoints)
Garbage and Recycling (Introducing Issues With Opposing Viewpoints)

Indulging in a wide spectrum of ideas, beliefs, and perspectives is a critical cornerstone of democracy. After all, it is often debates over differences of opinion, such as whether to legalize abortion, how to treat prisoners, or when to enact the death penalty, that shape our society and drive it forward. Such diversity of thought is...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Survivability and Traffic Grooming in WDM Optical Networks
Survivability and Traffic Grooming in WDM Optical Networks
Technological advances in semiconductor products have essentially been the primary
driver for the growth of networking that led to improvements and simplification
in the long-distance communication infrastructure in the twentieth century.Two
major networks of networks, the public switched telephone network (PSTN) and the...
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
Partial Differential Equations: Modelling and Numerical Simulation (Computational Methods in Applied Sciences)
Partial Differential Equations: Modelling and Numerical Simulation (Computational Methods in Applied Sciences)
This book is dedicated to Olivier Pironneau.

For more than 250 years partial differential equations have been clearly the most important tool available to mankind in order to understand a large variety of phenomena, natural at first and then those originating from human activity and technological development. Mechanics, physics and their...

Advances in Databases and Information Systems: Third East European Conference, ADBIS'99, Maribor, Slovenia,
Advances in Databases and Information Systems: Third East European Conference, ADBIS'99, Maribor, Slovenia,

The 3rd Eastern European Conference on Advances in Databases and Information Systems (ADBIS’99) took place on 13-16- September 1999, in Maribor, Slovenia. It was organized in cooperation with ACM SIGMOD, the Moscow chapter of ACM SIGMOD, Slovenian Society Informatika, and the Slovenian Ministry of Technology.

The aim...

The Music Producer's Survival Stories: Interviews with Veteran, Independent, and Electronic Music Professionals
The Music Producer's Survival Stories: Interviews with Veteran, Independent, and Electronic Music Professionals

Featuring interviews with professional full-time musicians, audio engineers, and producers who are making their own way in today's independent and electronic music scenes, The Music Producer's Survival Stories: Interviews with Veteran, Independent, and Electronic Music Professionals will inform you, encourage you, and inspire you to...

UNIX Unleashed: System Administrator's Edition
UNIX Unleashed: System Administrator's Edition
Master the Unix file systems and syntax as both a user and administrator with Unix Unleashed: System Administrator's Edition. Become an expert on the Unix system's organization, file storage, and essential commands. This large, comprehensive volume provides you with the fundamentals of system administration, including how to get around the...
XML Web Services in the Organization
XML Web Services in the Organization

Discover how you can use XML-based Web services to dramatically improve the data sharing and communication capabilities in your organization. This pragmatic guide teaches you how to exploit the interoperability features of the Microsoft .NET Framework to build highly available, platform-independent Web services. Easy-to-follow sample...

unlimited object storage image
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy