Home | Amazing | Today | Tags | Publishers | Years | Search 
Teach Yourself VISUALLY Microsoft Office 2007
Teach Yourself VISUALLY Microsoft Office 2007
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 220 Office 2007 tasks. Each task-based spread includes easy, visual directions for...
The Unofficial Guide to Landing a Job
The Unofficial Guide to Landing a Job
The inside scoop . . .for when you want more than the official line

Today's job market is more competitive than ever. How can you distinguish yourself from the competition and get the job you really want? The Unofficial Guide® to Landing a Job walks both new and veteran job hunters through every aspect of landing a great position, from...

Digital Video and DSP: Instant Access
Digital Video and DSP: Instant Access
Although there are many variations and implementation techniques, video signals are just a way of transferring visual information from one point to another. The information may be from a VCR, DVD player, a channel on the local broadcast, cable television, or satellite system, the Internet, cell phone, MP3 player, or one of many other sources....
Building Intelligent Interactive Tutors: Student-centered strategies for revolutionizing e-learning
Building Intelligent Interactive Tutors: Student-centered strategies for revolutionizing e-learning
Computers have transformed every facet of our culture, most dramatically communication, transportation, finance, science, and the economy. Yet their impact has not been generally felt in education due to lack of hardware, teacher training, and sophisticated software. Another reason is that current instructional software is neither truly responsive...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Ruby Phrasebook (Developer's Library)
Ruby Phrasebook (Developer's Library)
You can find some great Ruby books on the market. If you are new to Ruby, a friend or someone on the Internet has probably already listed some favorite Ruby books—and you should buy those books. But every book has its niche: Each attempts to appeal to a certain need of a programmer.

It is my belief that the best thing this book can
...
Phishing: Cutting the Identity Theft Line
Phishing: Cutting the Identity Theft Line
Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,...

A Digital Signal Processing Primer: With Applications to Digital Audio and Computer Music
A Digital Signal Processing Primer: With Applications to Digital Audio and Computer Music
This new book by Ken Steigliz offers an informal and easy-to-understand introduction to digital signal processing, emphasizing digital audio and applications to computer music. A DSP Primer covers important topics such as phasors and tuning forks; the wave equation; sampling and quantizing; feedforward and feedback filters; comb and string...
Foundation Form Creation with Adobe LiveCycle Designer ES
Foundation Form Creation with Adobe LiveCycle Designer ES
Form creation is key to information processing and forms workflow is a key concept within Adobe LiveCycle Enterprise Suite. Adobe LiveCycle Forms ES is a stand-alone product that also comes bundled with Adobe LiveCycle Enterprise Suite. This is the first and only book about this new product specifically created for the design, creation, and...
Optical Networks and Technologies: IFIP TC6 / WG6.10 First Optical Networks & Technologies Conference (OpNeTec), October 18-20, 2004, Pisa, Italy
Optical Networks and Technologies: IFIP TC6 / WG6.10 First Optical Networks & Technologies Conference (OpNeTec), October 18-20, 2004, Pisa, Italy
This book is of interest to both academic and professional researchers working in the field of optical fiber communication. The focus is on engineering networks exploiting advanced optical technologies. Originally presented at OpNeTec 2004, the chapters cover optical network systems, transmission, and amplification; theoretical aspects; system...
IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

PCs All-in-One Desk Reference For Dummies (Computer/Tech)
PCs All-in-One Desk Reference For Dummies (Computer/Tech)
Your one-stop guide to a long and happy relationship with your PC

Mark Chambers doesn't believe computers are supposed to be complicated, and this book proves it. Here you'll find the straightforward scoop on using and enjoying your PC, whether it's your first one or your fifth. From using Microsoft Works and getting online...

Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy