 |
|
|
 Laptops For Dummies (Computer/Tech)Laptops For Dummies, 3rd Edition shows you how to use your laptop to its fullest potential, from how to purchase a laptop and what to do when you first open the box to how to keep your laptop safe and running smoothly.
You will discover how to choose and purchase the right laptop for you, how to set up and maintain your laptop,... |  |  Joomla! For Dummies (Computer/Tech)
With its pre-coded modules, open source Joomla! is popular for building interactive Web sites without writing code. This Web site design tool lets you build sites with discussions, polling, RSS feeds, picture submissions, shopping carts, and a lot more, quickly and easily and the quickest, easiest way to learn how to use it is Joomla! For... |  |  |
|
 Engineering Science, Fifth EditionThe most comprehensive engineering science text available - fully in line with the latest pre-degree course requirements
. Generic topic-based approach - ensures suitability for all vocational and pre-degree level students . Coverage of all the mechanical, electrical and electronic principles... |  |  |  |  |
|
 Fundamentals of Air Pollution, Fourth EditionA compendium for all involved directly or indirectly in decision making about air pollution control-regulatory or engineering.
Fundamentals of Air Pollution is an important and widely used textbook in the environmental science and engineering community. Written shortly after the passage of the seminal Clean Air Act... |  |  How to Do Everything with Your iPhoneGet the most out of your iPhone by learning how to use all of its powerful capabilities. Filled with tips, tricks, and shortcuts, this book shows you how to set up your iPhone, make calls, manage voicemail, and load contacts. But that's just the beginning. You'll also learn how to send and receive email, look up turn-by-turn directions, listen to... |  |  Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... |
|
| Result Page: 767 766 765 764 763 762 761 760 759 758 757 756 755 754 753 752 751 750 749 |