Why program Excel? For solving complex calculations and presenting results, Excel is amazingly complete with every imaginable feature already in place. But programming Excel isn't about adding new features as much as it's about combining existing features to solve particular problems. With a few modifications, you can transform...
Your wishes are granted! The new release that is the focus of this book—2007 Microsoft Office system—has been designed to answer just these kinds of needs for people working with information the world over. The 2007 release not only offers better integration, enhanced communication, professional presentation, and expanded...
Twenty years ago, when most computers were mainframes or minicomputers, operators and administrators had scheduled, specific tasks they needed to perform on an ongoing basis. Each time a task was performed, they had to make note of the time and write their initials in a logbook to demonstrate when the task was performed ...
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...
A Dynamic, Research-Based Approach to Knowledge Management
In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked...
The demand for mobile access to data no matter where the data is stored and where the user happens to be, in addition to the explosive growth of the Internet and the rising popularity of mobile devices, are among the factors that have created a dynamic business environment, where companies are competing to provide customers access to information...
"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising." - Gary Bennett,...
Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.
The book concentrates on teaching Cocoa development first, and then takes that knowledge and...
The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed independently by different disciplines. This is the first truly...
"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...
New Directions in Cognitive Information Retrieval presents an exciting new direction for research into cognitive oriented information retrieval (IR) research, a direction based on an analysis of the user’s problem situation and cognitive behavior when using the IR system. This contrasts with the current dominant IR research...
This book constitutes the thoroughly refereed post-proceedings of the 5th International Bi-Conference Workshop on Agent-Oriented Information Systems, held in Melbourne, Australia in July 2003 at AAMAS 2003 and in Chicago, IL, USA in October 2003 at ER 2003.
The revised full papers presented were carefully selected during two rounds of reviewing...