 |
|
 Foundation Flash Catalyst
This book offers an introduction to Flash Catalyst for designers with intermediate to advanced skills. It discusses where Catalyst sits within the production process and how it communicates with other programs. It covers all of the features of the Flash Catalyst workspace, teaching you how to create designs from scratch, how to build... |  |  Silverlight 4 Business Intelligence Software
Business Intelligence (BI) software allows you to view different components of a business using a single visual platform, which makes comprehending mountains of data easier. BI is everywhere. Applications that include reports, analytics, statistics, and historical and predictive modeling are all examples of BI. Currently, we are in the second... |  |  Management Strategies for the Cloud Revolution
Increase efficiency while saving money with “on-demand” computing
The biggest game-changing force in business since the creation of the Internet, cloud computing simplifies and lowers the cost of operations while providing flexibility and power you never dreamed possible. Make your strategic move now, with... |
|
 Up and Running with Joomla, Second Edition
Need to launch a feature-rich website quickly where you have one or more people authoring the content? Want to use a powerful, robust, and scalable Content Management System (CMS) you can trust? This Short Cut will get you up and running with Joomla 1.5, a freely available open source CMS. Learn how to install, configure, customize, and... |  |  Java for the Beginning Programmer
Java for the Beginning Programmer teaches Java to someone with absolutely no programming background. This book focuses on core programming topics such as variables, looping, subroutines, and program layout. This course focuses on real programming techniques, and not using an Integrated Development Environment (IDE) to generate code. This... |  |  |
|
 Network Security: A Decision and Game-Theoretic Approach
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of... |  |  Computer Networks ISE: A Systems Approach
I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security... |  |  Dr. Atkins' New Diet Revolution
Weight loss, weight maintenance, good health and disease prevention through the Atkins nutritional approach.
Dr. Atkins' original Diet Revolution helped millions lose weight and maintain their weight loss for life. His sensational follow-up, Dr Atkins' New Diet Revolution, concentrated on total wellness in addition to... |
|
|
| Result Page: 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 |