|
|
|
|
|
Beginning Access 2007 VBAIf you want to take your Access databases to a more robust level of functionality, then this is the book for you. It provides the tools and techniques you'll need in order to build more sophisticated solutions. You'll find plenty of source code and fully developed sample applications to guide you along the way.
After walking through the... | | IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating... | | Engaging Privacy and Information Technology in a Digital AgePrivacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly unbounded options for collecting, saving, sharing, and comparing information trigger consumer worries; online practices of businesses and government agencies present new ways to compromise privacy; and e-commerce and technologies... |
|
|
| | | | The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP LawThe content goes from the basics to advanced topics such as off-shoring, anti-circumvention, open source business models, user-created content, reverse engineering, mobile media distribution, web and game development, mash-ups, web widgets, and massively multiplayer games.
This book is designed to empower you to:
* Understand... |
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 |