Home | Amazing | Today | Tags | Publishers | Years | Search 
Teach Yourself VISUALLY Word 2007 (Tech)
Teach Yourself VISUALLY Word 2007 (Tech)
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 150 Word 2007 tasks. Each task-based spread includes easy, visual directions for...
Phishing: Cutting the Identity Theft Line
Phishing: Cutting the Identity Theft Line
Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,...

Encyclopedia of Data Warehousing and Mining, Second Edition
Encyclopedia of Data Warehousing and Mining, Second Edition
The Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400...
Microstock Photography: How to Make Money from Your Digital Images
Microstock Photography: How to Make Money from Your Digital Images
One-stop guide to making money from microstocks, the world's fastest growing imaging phenomenon.

Be a part of one of the world's fastest growing imaging phenomenons: microstock photography. Microstock photography provides both professional and amateur photographers an opportunity to diversify their income and expand their
...
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Evaluating Information Systems: Public and Private Sector
Evaluating Information Systems: Public and Private Sector
Companies make a huge investment of 4 to 10% of their turnover on IT - this book reveals how this is evaluated and measured.

The adoption of Information Technology (IT) and Information Systems (IS) represents significant financial investments, with alternative perspectives to the evaluation domain coming from both the public
...
Podcasting Bible
Podcasting Bible
"This is the book that you'll want to read about podcasting—the technology that everyday people, in addition to the big-name radio networks, are using to broadcast to the world."
— Robert Scoble, Vice President Media Development, Podtech.net

Create and market successful podcasts from your desktop, for...

Access Denied in the Information Age
Access Denied in the Information Age
It was to be expected that a new millennium should bring with it a flurry of observers claiming that we stand on the threshold of a new society. We have not been disappointed. The media excitement at the fantastic financial speculation on the high-tech and internet stock market is but one instance cited to support this claim. This new society is...
Designing a Not-for-Profit Compensation System
Designing a Not-for-Profit Compensation System
Designing A Not-For-profit Compensation System

Until now, human resource and compensation professionals in the public/not-for-profit sector didn't have a compensation guidebook specifically for them. Unlike their for-profit counterparts, specialists in the not-for-profit sector wrestle with such questions as:

Pro LINQ Object Relational Mapping in C# 2008
Pro LINQ Object Relational Mapping in C# 2008
It is nearly impossible today to write enterprise software without the use of one or more relational databases. Granted, there are cases when the data is transient and not stored in a database, but for the most part, software needs to consume and manipulate data in a database. It sounds easy, but there are hundreds of ways to connect software...
Aspect-Oriented Programming with AspectJ
Aspect-Oriented Programming with AspectJ
In a November 2001 Java Pro magazine article, noted Java pundit Daniel Savarese states, "The days of Object-Oriented Programming may be numbered, One day we may all be using Aspect-Oriented Programming ." While this may be hyperbole, the AOP bring certain needed improvements to the OOP. AspectJ is a Java-based tool that allows...
M Commerce: Technologies, Services, and Business Models
M Commerce: Technologies, Services, and Business Models
Presenting the first book ever to provide a complete introduction to m-Commerce!

Mobile Commerce, or m-Commerce, is part of an explosion of new usage scenarios that overcome the limitations of mobile devices in support of highly personalized and time-critical activities for consumers and enterprises alike. With tens of millions
...
Result Page: 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy