 |
|
 Teach Yourself VISUALLY Word 2007 (Tech)Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 150 Word 2007 tasks. Each task-based spread includes easy, visual directions for... |  |  Phishing: Cutting the Identity Theft LineHave you been caught yet?
They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,... |  |  Encyclopedia of Data Warehousing and Mining, Second EditionThe Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400... |
|
 Microstock Photography: How to Make Money from Your Digital ImagesOne-stop guide to making money from microstocks, the world's fastest growing imaging phenomenon.
Be a part of one of the world's fastest growing imaging phenomenons: microstock photography. Microstock photography provides both professional and amateur photographers an opportunity to diversify their income and expand their... |  |  Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... |  |  Evaluating Information Systems: Public and Private SectorCompanies make a huge investment of 4 to 10% of their turnover on IT - this book reveals how this is evaluated and measured.
The adoption of Information Technology (IT) and Information Systems (IS) represents significant financial investments, with alternative perspectives to the evaluation domain coming from both the public... |
|
|
 Pro LINQ Object Relational Mapping in C# 2008It is nearly impossible today to write enterprise software without the use of one or more relational databases. Granted, there are cases when the data is transient and not stored in a database, but for the most part, software needs to consume and manipulate data in a database. It sounds easy, but there are hundreds of ways to connect software... |  |  Aspect-Oriented Programming with AspectJIn a November 2001 Java Pro magazine article, noted Java pundit Daniel Savarese states, "The days of Object-Oriented Programming may be numbered, One day we may all be using Aspect-Oriented Programming ." While this may be hyperbole, the AOP bring certain needed improvements to the OOP. AspectJ is a Java-based tool that allows... |  |  M Commerce: Technologies, Services, and Business ModelsPresenting the first book ever to provide a complete introduction to m-Commerce! Mobile Commerce, or m-Commerce, is part of an explosion of new usage scenarios that overcome the limitations of mobile devices in support of highly personalized and time-critical activities for consumers and enterprises alike. With tens of millions... |
|
Result Page: 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 |