|
|
|
|
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)All-in-One is All You Need
Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains... | | 3D Programming for Windows (Pro - Developer)The Windows Presentation Foundation is a key component of .NET Framework 3.0, which is a part of Windows Vista and available for Windows XP. With the Windows Presentation Foundation, 3D images can be displayed regardless of the video-display hardware on the users machine. Focusing on developing user interface objects or simple animations, this book... | | How to Do Everything with PowerPoint(R)Follow real-world examples in this get-you-going guide and create your own PowerPoint presentations--from simple to dazzlingly sophisticated. Prepare slide shows--which you can show on a projection screen or computer monitor--featuring animation, sound, graphics, and even video clips. Edit and format text, add graphs and diagrams, include... |
|
Bioinformatics: Problem Solving ParadigmsThere are fundamental principles for problem analysis and algorithm design that are continuously used in bioinformatics. This book concentrates on a clear presentation of these principles, presenting them in a self-contained, mathematically clear and precise manner, and illustrating them with lots of case studies from main fields of bioinformatics... | | | | |
|
Usability: Turning Technologies into Tools"The book contains much insight." --B. Hazeltine, Computing Reviews "Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of... | | Terrorism Informatics: Knowledge Management and Data Mining for Homeland SecurityTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... | | Linux Administration Handbook (2nd Edition)As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a... |
|
|
|
Result Page: 804 803 802 801 800 799 798 797 796 795 794 793 792 791 790 789 788 787 786 |