Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Photoshop Elements 12 All-in-One For Dummies
Photoshop Elements 12 All-in-One For Dummies

Make ordinary photos extraordinary with Photoshop Elements 12 All-in-One For Dummies!

Whether you prefer to snap shots on your smartphone or don’t ever leave home without your DSLR, chances are you have way more photos than you ever dreamed possible. Photoshop Elements 12 All-in-One For Dummies is here to...

NetBeans  Ruby and Rails IDE with JRuby (FirstPress)
NetBeans Ruby and Rails IDE with JRuby (FirstPress)

As Ruby and Rails continues to grow, and more and more jobs are coming online that require you to effectively develop Ruby and Rails in the web tier. Beyond the Rails framework, there are still very few proven tools and IDEs to get the job done, at least until now. The NetBeans Ruby and Rails IDE, according to some, is by far the best and...

Numerical Methods using MATLAB
Numerical Methods using MATLAB

Numerical Methods with MATLAB provides a highly-practical reference work to assist anyone working with numerical methods. A wide range of techniques are introduced, their merits discussed and fully working MATLAB code samples supplied to demonstrate how they can be coded and applied.

...
Office 2016 For Seniors For Dummies
Office 2016 For Seniors For Dummies

Keep up with the latest Office technologies, and learn the fundamentals of Microsoft Office 2016!

Office 2016 For Seniors For Dummies is the ideal resource for learning the fundamentals of the Microsoft Office suite. You'll explore the functionality of Word, Excel, PowerPoint, and Outlook, establishing basic...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Nelson Essentials of Pediatrics, 5E with STUDENT CONSULT Access Fifth Edition(Nelson Essentials of Pediatrics)
Nelson Essentials of Pediatrics, 5E with STUDENT CONSULT Access Fifth Edition(Nelson Essentials of Pediatrics)

Completely revised and updated, this reference of choice for students and practitioners offers practical guidance and the latest information on normal growth and development, along with the diagnosis, management, and prevention of common childhood diseases and disorders. Discussions of the pathophysiologic aspects of pediatric disease, the...

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers,...

Colorectal Cancer
Colorectal Cancer

Nurses should have the most up-to-date knowledge to provide accurate information and competent nursing care to patients with colorectal cancer. Swan addresses those issues in a very thorough and comprehensive manner.

Chapters on the role of the colorectal nurse specialist, epidemiology and genetics, diagnosis, investigations and...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)
Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)

This book presents a remarkable collection of chapters that cover a wide range of topics in the areas of information and communication technologies and their real-world applications. It gathers the Proceedings of the Future of Information and Communication Conference 2019 (FICC 2019), held in San Francisco, USA from March 14 to 15,...

Enterprise Governance of Information Technology: Achieving Alignment and Value in Digital Organizations (Management for Professionals)
Enterprise Governance of Information Technology: Achieving Alignment and Value in Digital Organizations (Management for Professionals)
This book integrates theoretical advances and empirical data on Enterprise Governance in Information Technology (EGIT) with practical applications based on numerous case examples. The third revised edition of Enterprise Governance of Information Technology provides professionals and students with the most recent research advancements as...
Cognitive Superiority: Information to Power
Cognitive Superiority: Information to Power

In a world of accelerating unending change, perpetual surveillance, and increasing connectivity, conflict has become ever more complex. Wars are no longer limited to the traditional military conflict domains?land, sea, air; even space and cyber space. The new battlefield will be the cognitive domain and the new conflict a larger...

unlimited object storage image
Result Page: 932 931 930 929 928 927 926 925 924 923 922 921 920 919 918 917 916 915 914 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy