|
|
|
|
The Role of Labour Mobility and Informal Networks for Knowledge TransferThe purpose of this volume is to analyze the microfoundations of knowledge spillovers. The microeconomic analysis of spillovers leads to the insight that the spillover and flow of knowledge is not at all automatic. Instead, this volume suggests that a filter exists between knowledge and its economic application. The focus of this volume is on... | | Programming the Microsoft Windows Driver ModelMicrosoft’s new driver model for Windows 98 and Windows 2000 supports Plug and Play, provides power management capabilities, and expands on the driver/minidriver approach. Written by device-driver expert Walter Oney in cooperation with the Windows DDK team, this book provides extensive practical examples, illustrations, advice, and... | | Real World Camera Raw with Adobe Photoshop CS5
If you’re reading this book because you want to be told that digital really is better than film, look elsewhere. The term “digital photography” may still be in current use, but sooner rather than later, it will be replaced by the simple term “photography.” If you want to be told that shooting digital raw is... |
|
Microstrip Filters for RF/Microwave Applications
Advanced, specialized coverage of microstrip filter design
Microstrip Filters for RF/Microwave Applications is the only professional reference focusing solely on microstrip filters. It offers a unique and comprehensive treatment of filters based on the microstrip structure and includes full design methodologies that are also... | | Microsoft Excel 2013 Plain & Simple
Get the guide that makes learning Microsoft Excel plain and simple! This full color, no-nonsense book shows you the quickest ways to solve a problem or learn a skill, using easy-to-follow steps and concise, straightforward language. You'll analyze, manage, and share information in more ways than ever before.
... | | CSS Hacks and Filters: Making Cascading Stylesheets WorkHere's how to make CSS work the way it should
Cascading Style Sheets, the technology meant to bring order out of chaos by letting you update Web sites effortlessly, just doesn't always work. You recognize that when you discover your graphics, perfectly positioned in Firefox, throw your page out of whack when viewed in Explorer. The solution?... |
|
| | Excel 2010: The Missing Manual
Excel, the world's most popular spreadsheet program, has the muscle to analyze heaps of data. Beyond basic number-crunching, Excel 2010 has many impressive features that are hard to find, much less master -- especially from online help pages. This Missing Manual clearly explains how everything works with a unique and witty style... | | Programming Reactive Extensions and LINQ
Right now, we as programmers are at an impasse—a transition period between the well-understood
world of imperative programming, and a world that is increasingly at odds with this model. In the ’80s,
everything was simple: one machine, one thread, no network.
CPUs are now scaling horizontally, adding more and more... |
|
Oracle CRM On Demand Reporting (Osborne Oracle Press)Your One-Stop Guide to Oracle CRM On Demand Reporting
Plan, build, and distribute data-rich business intelligence reports with ease. Oracle CRM On Demand Reporting details the entire report-building process and explains how to use the powerful features available in Answers On Demand to create and share... | | Getting Started with FortiGate
This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.
Overview
-
Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
| | Hacking the Code: ASP.NET Web Application SecurityThis unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |