|
|
|
|
| | Laptops For Dummies Quick Reference (Computer/Tech)If you’re a part of the business world, chances are that you need to use a laptop for mobile computing. Newly revised and updated to serve as a valuable guide for anyone who operates a laptop computer, Laptops for Dummies Quick Reference, 2nd Edition is an indispensable guide that’s perfect for when you’re on... | | Why Programs Fail, Second Edition: A Guide to Systematic DebuggingWhy Programs Fail, winner of the Jolt Productivity Award, has been freshly updated to bring readers up-to-speed on all the new methodologies that will help save them, their companies, and consumers a lot of headaches. Find out about bugs in computer programs, how to find them, how to reproduce them, and how to fix them in such a way that they do... |
|
Tragic Design: The Impact of Bad Product Design and How to Fix It
Bad design is everywhere, and its cost is much higher than we think. In this thought-provoking book, authors Jonathan Shariat and Cynthia Savard Saucier explain how poorly designed products can anger, sadden, exclude, and even kill people who use them. The designers responsible certainly didn’t intend harm, so what can you do... | | Cascading Style Sheets: Designing for the Web, Third EditionDirect from the creators of CSS, this is the definitive reference to CSS 2.1, today's indispensable standard for controlling the appearance of any Web or XML document. This full-color book doesn't just show how to use every significant CSS 1 and 2.x feature; it carefully explains the "why" behind today's most... | | The Internet and American Business (History of Computing)
The effect of a commercialized Internet on American business, from the boom in e-commerce and adjustments by bricks-and-mortar businesses to file-sharing and community building.
When we think of the Internet, we generally think of Amazon, Google, Hotmail, Napster,
MySpace, and a host of other sites for buying products, searching... |
|
SQL Antipatterns: Avoiding the Pitfalls of Database Programming
Each chapter in this book helps you identify, explain, and correct a unique and dangerous antipattern. The four parts of the book group the anti?patterns in terms of logical database design, physical database design, queries, and application development.
The chances are good that your application's database... | | Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... | | Think Python
In January 1999 I was preparing to teach an introductory programming class in Java. I had taught it three times and I was getting frustrated. The failure rate in the class was too high and, even for students who succeeded, the overall level of achievement was too low.
One of the problems I saw was the books. They were too ... |
|
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |