Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Excel with VBA and .NET
Programming Excel with VBA and .NET

Why program Excel? For solving complex calculations and presenting results, Excel is amazingly complete with every imaginable feature already in place. But programming Excel isn't about adding new features as much as it's about combining existing features to solve particular problems. With a few modifications, you can transform...

First Look 2007 Microsoft  Office System
First Look 2007 Microsoft Office System
Your wishes are granted! The new release that is the focus of this book—2007 Microsoft Office
system—has been designed to answer just these kinds of needs for people working with information
the world over. The 2007 release not only offers better integration, enhanced communication,
professional presentation, and expanded
...
Windows Server 2003 Pocket Administrator
Windows Server 2003 Pocket Administrator
Twenty years ago, when most computers were mainframes
or minicomputers, operators and administrators had
scheduled, specific tasks they needed to perform on an
ongoing basis. Each time a task was performed, they had
to make note of the time and write their initials in a
logbook to demonstrate when the task was performed...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Instructional Engineering in Networked Environments (Tech Training Series)
Instructional Engineering in Networked Environments (Tech Training Series)
A Dynamic, Research-Based Approach to Knowledge Management

In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked...

Handbook of Research on Mobile Multimedia
Handbook of Research on Mobile Multimedia
The demand for mobile access to data no matter where the data is stored and where the user happens to be, in addition to the explosive growth of the Internet and the rising popularity of mobile devices, are among the factors that have created a dynamic business environment, where companies are competing to provide customers access to information...
Chemical Process Safety: Learning from Case Histories
Chemical Process Safety: Learning from Case Histories
"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising."
 - Gary Bennett,
...
Mac OS X Advanced Development Techniques
Mac OS X Advanced Development Techniques

Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.

The book concentrates on teaching Cocoa development first, and then takes that knowledge and...

Principles of Data Mining (Adaptive Computation and Machine Learning)
Principles of Data Mining (Adaptive Computation and Machine Learning)

The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed independently by different disciplines. This is the first truly...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

New Directions in Cognitive Information Retrieval (The Information Retrieval Series)
New Directions in Cognitive Information Retrieval (The Information Retrieval Series)
New Directions in Cognitive Information Retrieval presents an exciting new direction for research into cognitive oriented information retrieval (IR) research, a direction based on an analysis of the user’s problem situation and cognitive behavior when using the IR system. This contrasts with the current dominant IR research...
Agent-Oriented Information Systems: 5th International Bi-Conference Workshop, AOIS 2003, Melbourne, Australia
Agent-Oriented Information Systems: 5th International Bi-Conference Workshop, AOIS 2003, Melbourne, Australia
This book constitutes the thoroughly refereed post-proceedings of the 5th International Bi-Conference Workshop on Agent-Oriented Information Systems, held in Melbourne, Australia in July 2003 at AAMAS 2003 and in Chicago, IL, USA in October 2003 at ER 2003.

The revised full papers presented were carefully selected during two rounds of reviewing...

unlimited object storage image
Result Page: 900 899 898 897 896 895 894 893 892 891 890 889 888 887 886 885 884 883 882 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy