Home | Amazing | Today | Tags | Publishers | Years | Search 
Foundation Form Creation with Adobe LiveCycle Designer ES
Foundation Form Creation with Adobe LiveCycle Designer ES
Form creation is key to information processing and forms workflow is a key concept within Adobe LiveCycle Enterprise Suite. Adobe LiveCycle Forms ES is a stand-alone product that also comes bundled with Adobe LiveCycle Enterprise Suite. This is the first and only book about this new product specifically created for the design, creation, and...
A Digital Signal Processing Primer: With Applications to Digital Audio and Computer Music
A Digital Signal Processing Primer: With Applications to Digital Audio and Computer Music
This new book by Ken Steigliz offers an informal and easy-to-understand introduction to digital signal processing, emphasizing digital audio and applications to computer music. A DSP Primer covers important topics such as phasors and tuning forks; the wave equation; sampling and quantizing; feedforward and feedback filters; comb and string...
Phishing: Cutting the Identity Theft Line
Phishing: Cutting the Identity Theft Line
Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,...

Ruby Phrasebook (Developer's Library)
Ruby Phrasebook (Developer's Library)
You can find some great Ruby books on the market. If you are new to Ruby, a friend or someone on the Internet has probably already listed some favorite Ruby books—and you should buy those books. But every book has its niche: Each attempts to appeal to a certain need of a programmer.

It is my belief that the best thing this book can
...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Building Intelligent Interactive Tutors: Student-centered strategies for revolutionizing e-learning
Building Intelligent Interactive Tutors: Student-centered strategies for revolutionizing e-learning
Computers have transformed every facet of our culture, most dramatically communication, transportation, finance, science, and the economy. Yet their impact has not been generally felt in education due to lack of hardware, teacher training, and sophisticated software. Another reason is that current instructional software is neither truly responsive...
The Unofficial Guide to Windows Vista
The Unofficial Guide to Windows Vista
The inside scoop...for when you want more than the official line!

Microsoft Vista may be the hot new operating system, but to use it with confidence, you'll need to know its quirks and shortcuts. Find out what the manual doesn't always tell you in this insider's guide to using Vista in the real world. How can you customize...

2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
VoIP Voice and Fax Signal Processing
VoIP Voice and Fax Signal Processing
Voice over IP (VoIP) gained popularity through actual deployments and by making use of VoIP - based telephone and fax calls with global roaming and connectivity via the Internet. Several decades of effort have gone into VoIP, and these efforts are benefi tting real applications. Several valuable books have been published by experts in the fi eld....
The Art & Science of JavaScript
The Art & Science of JavaScript
We've assembled seven of the greatest minds in modern JavaScript to teach you the most inspirational techniques you'll ever use. From creating impressive mashups and stunning, dynamic graphics, to more subtle user-experience enhancements, you're about to be amazed by the true potential of this powerful language.

With an all star line-up of...

Teach Yourself VISUALLY Windows Vista (Tech)
Teach Yourself VISUALLY Windows Vista (Tech)
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 140 Windows Vista tasks. Each task-based spread includes easy, visual directions for...
Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy