Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Staying Power : 30 Secrets Invincible Executives Use for Getting to the Top - and Staying There
Staying Power : 30 Secrets Invincible Executives Use for Getting to the Top - and Staying There

You have the talent, and you have the ambition—but you lack a specific career plan to get you to the top. Believe it or not, you’re right on track! “Do not map out your career” is the first of thirty surprising success secrets that you’ll discover in Staying Power. In this completely practical, often...

C++ Programming for the Absolute Beginner (For the Absolute Beginner)
C++ Programming for the Absolute Beginner (For the Absolute Beginner)

No experience required to Learn C++ Programming

If you are new to programming with C++ and are looking for a solid introduction, this is the reference for you. Developed by computer science professors, books in the for the Absolute Beginner series teach the principles of programming though simple game creating. You will...

Java and BAPI Technology for SAP (Prima Tech's Sap Book Series)
Java and BAPI Technology for SAP (Prima Tech's Sap Book Series)

Draw from the authors' years of experience with SAP implementations. Follow along and learn how platform independent Java can reduce both development and on-going maintenence costs for custom software. Learn how to integrate Java with SAP, and the basics of integrating the SAP Automation toolkit to develop applets or Java applications.

...
Professional Ajax (Programmer to Programmer)
Professional Ajax (Programmer to Programmer)
Combining tried-and-true CSS, XML, and JavaScript™ technologies, Ajax provides web developers with the ability to create more sophisticated and responsive user interfaces and break free from the "click-and-wait" standard that has dominated the web since its introduction.

This book discusses the range of request brokers...

Nonprofit Essentials: Managing Technology
Nonprofit Essentials: Managing Technology

This book is intended to help nonprofit leaders become not only more effective as
administrators, marketers, researchers, and fundraisers, but also more responsible custodians
of limited funds.When every penny counts, computers can help to make it
possible for small, committed groups to perform the routine tasks that once...

How to Use Adobe Photoshop CS2
How to Use Adobe Photoshop CS2

Have you ever looked at your color pictures and wished you could make them black and white? Or maybe you've dreamed about taking that photo of your brother, cutting the head off and placing it on the body of a grizzly bear. The tool that you need is Adobe Photoshop and the book you need to learn all about it is ...

A Tester's Guide to .NET Programming
A Tester's Guide to .NET Programming
Today’s software testing environment has changed. A common trend we are seeing these days is
advertisements for software developers and testers that look virtually the same. Today, companies
all seem to require software test professionals with in-depth knowledge of programming languages
and with significant database skills.
...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Understanding Linux Network Internals
Understanding Linux Network Internals

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly...

UMTS and Mobile Computing
UMTS and Mobile Computing
This unique book bridges the gap between ubiquitous computing (UBICOMP) and third generation mobile communication. A first-of-its-kind, this resource helps you decide which are the most promising technologies to use for specific mobile communication applications. Scenarios indicate how new applications will be developed and how to implement them....
Maya 8 Character Modeling (Wordware Applications Library)
Maya 8 Character Modeling (Wordware Applications Library)
This Maya modeling book is unique in its approach to modeling a high-resolution character model. Where other books take a grueling approach that often leaves readers confused, Maya 8 Character Modeling breaks down the character into an easy-to-follow formula. Readers learn that modeling a character can be accomplished without the fear of being in...
Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
unlimited object storage image
Result Page: 953 952 951 950 949 948 947 946 945 944 943 942 941 940 939 938 937 936 935 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy