Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
X Power Tools
X Power Tools
This book puts you in charge of the most flexible and adaptable graphical interface in the computer industry. The X Window System underlies graphical desktops on Linux and Unix systems, and supports advanced features of modern graphics cards. More people use the X Window System than ever before, but there are few books about X in print. X Power...
Office VBA Macros You Can Use Today: Over 100 Amazing Ways to Automate Word, Excel, PowerPoint, Outlook, and Access
Office VBA Macros You Can Use Today: Over 100 Amazing Ways to Automate Word, Excel, PowerPoint, Outlook, and Access
A simple macro language appeared in version 3 of VisiCalc. When Lotus 1-2-3 introduced the keystroke macro recorder, accountants everywhere began developing arcane little macros to automate the daily task of importing and formatting sales data in their spreadsheets. When Excel 5 shipped with a new macro language called VBA in 1993, the world...
Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
With compelling insights and illuminating examples, the author reveals how Web sites, software applications, and mobile devices can be used to change people’s attitudes and behavior.

Can computers change what you think and do? Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army?

...
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Java ME on Symbian OS: Inside the Smartphone Model (Symbian Press)
Java ME on Symbian OS: Inside the Smartphone Model (Symbian Press)
In Java ME on Symbian OS, the authors expose the opportunities for application developers wishing to use Java ME on Symbian OS.

Written by a team of experts from Symbian, Nokia and Sun Microsystems Java ME on Symbian OS reveals what can be found “under-the-hood” of the world’s leading smartphone...

Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy
Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy

This book chronicles how a controversial set of policy assumptions about the Japanese economy, known as revisionism, rose to become the basis of the trade policy approach of the Clinton administration. In the context of growing fear over Japan's increasing economic strength, revisionists argued that Japan represented a distinctive form of...

Work On Your Game: Use the Pro Athlete Mindset to Dominate Your Game in Business, Sports, and Life
Work On Your Game: Use the Pro Athlete Mindset to Dominate Your Game in Business, Sports, and Life
Your game plan for career success?from International Basketball Pro Dre Baldwin

No one knows how to turn unrelenting self-belief into hard-and-fast career results better than Dre Baldwin. When everyone and everything was telling him to give up on his goal of playing pro basketball, he got focused on his future, and
...
Dannemora: Two Escaped Killers, Three Weeks of Terror, and the Largest Manhunt Ever in New York State
Dannemora: Two Escaped Killers, Three Weeks of Terror, and the Largest Manhunt Ever in New York State
The Prison Break, the Manhunt, the Inside Story
 
In June 2015, two vicious convicted murderers broke out of the Clinton Correctional Facility in Dannemora, in New York’s North Country, launching the most extensive manhunt in state history. Aided by prison employee Joyce Mitchell, double murderer Richard
...
Applying Use Case Driven Object Modeling with UML: An Annotated e-Commerce Example
Applying Use Case Driven Object Modeling with UML: An Annotated e-Commerce Example

Applying Use Case Driven Object Modeling with UML: An Annotated e-Commerce Example is a practical, hands-on guide to putting use case methods to work in real-world situations. This workbook is a companion to Use Case Driven Object Modeling with UML. It bridges the gap between the theory presented in the main book...

Managing NFS and NIS, 2nd Edition
Managing NFS and NIS, 2nd Edition
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.
Managing NFS and NIS, in a new edition based on Solaris 8,
...
Hybrid Architectures for Intelligent Systems
Hybrid Architectures for Intelligent Systems

The interaction between Fuzzy Set theory and Neural Network theory is multi-faceted and occurs at many different levels. The connection between these two concepts occurs both in the framework of real and artificial neural systems.

The brain is not just a collection of neurons grouped together at some part of the animal’s body,...

unlimited object storage image
Result Page: 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy