 |
|
 Special Edition Using WordPerfect 12
This must have reference on WordPerfect 12, is crammed full with tips, tricks, and practical examples not found anywhere else.
This is the most comprehensive and up-to-date book on the market today.
Title is backed and promoted by WordPerfect Universe (most popular WP site), and wpwriter.com (one of the top 3 WP web... |  |  Maximizing Your Sales with Microsoft Dynamics CRM 4.0Microsoft Dynamics CRM 4.0 is a fully integrated customer relationship management (CRM) system that gives busy sales professionals the capability to easily create and maintain a clear view of customers from first contact through purchase and post-sales. If you're one of these busy sales professionals, you need an easy reference tool to maximize... |  |  SAS/FSP 9.2 Procedures GuideProvides complete descriptions of all statements, options, windows, and commands that can be used with SAS/FSP software's FSBROWSE, FSEDIT, FSLETTER, and FSVIEW procedures.
The procedures in SAS/FSP software provide convenient interactive facilities for data
entry, editing, and retrieval. Using SAS/FSP software you can
|
|
|
|
 The Language of Demons and Angels: Cornelius Agrippa's Occult Philosophy
Heinrich Cornelius Agrippa von Nettesheim (1486-1535), as befits a great magician, left behind him a number of mysteries for posterity. In two letters to his friends, in which he discussed the progress of his great treatise on magic De occulta philosophia libri tres1 [Three Books of Occult Philosophy, hereafter DOP ], Agrippa wrote of a... |  |  Hackers and Painters: Big Ideas from the Computer Age
"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. "
--from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham
We are living in the computer age, in a world increasingly designed and... |  |  Encyclopedia of Cryptology
Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that... |
|
Result Page: 15 14 13 12 11 10 9 8 7 6 |