 |
|
 Microsoft® SQL Server 2008 R2 Analytics & Data Visualization
This book is written for the “information worker” businessperson who already
uses Microsoft Office applications such as Excel, Word, or Visio to accomplish
his or her daily work. Today, information workers most often work in the
collaboration environment of SharePoint, where their spreadsheets and documents are
saved and... |  |  Android Fully Loaded
Adobe MAX is a conference sponsored by Adobe every year
to bring together developers and designers who work with
Adobe technologies and enable them to learn new techniques,
network with one another, and, in general, get excited about
the company and its products. Of course, the attendees of a
conference like MAX are almost by... |  |  Expert Resumes for Computer and Web Jobs, 3rd Ed
Job search and career management become remarkably more complex and more
competitive with each passing year. One major contributor to the new complexity
is technology itself, which has created entirely new methods and systems for job
search, recruitment, hiring, and lifelong career development.
Fortunately, this new... |
|
 Unity 3 Game Development Hotshot
Only Unity fits the bill of being a game engine that allows you to create a full 3D game for free, and with phenomenal community support. This book will equip you with the skills to create professional looking games at no cost.
Unity 3 Game Development Hotshot will teach you how to exploit the full array of Unity 3D's... |  |  100% Photoshop: Create stunning artwork without using any photographs
Photoshop is the world’s best-known, best-loved and just downright best photographic
manipulation application. It’s used by retouchers, fine artists, graphic designers,
photographers, and everyone who works with images in any form.
But there’s another side to Photoshop. In my work as an illustrator for... |  |  Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files. This
book is about the latter.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the... |
|
|
|
| Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 |