|
|
|
|
Microsoft Outlook 2007 BibleDiscover all the ways Outlook can make your life easier
Outlook has been called the Swiss army knife of applications, and with good reason. In one handy package, you get the tools you use constantly—e-mail, a calendar and appointment book, a contacts list, a to-do list, and more. Learn to use them together, and you have a sophisticated... | | The Synthetic Organic Chemists CompanionA practical, hands-on guide that belongs in every organic chemistry lab
A unique reference that consolidates essential information in a practical, user-friendly format, The Synthetic Organic Chemist's Companion provides a detailed description
of how to perform synthetic reactions in real-world research settings, covering the most... | | Create!: The No Nonsense Guide to Photoshop Elements 2Because Your Computer Should Improve Your Life, Not Complicate It
No Nonsense Guides are here. With a plainspoken approach, these books are inexpensive starters that are light on idle chat and heavy on practical advice. They're lean and mean and stripped down to fighting weight, so you'll get from point A to point Z with instruction... |
|
Tapestry 5: Building Web ApplicationsThis book is a practical step-by-step tutorial for those who want to build contemporary, real-life web applications with Tapestry 5, the Apache open-source framework for creating dynamic, robust, highly scalable web applications in Java. It shows the path of least resistance, so that the reader can learn all the essential skills quickly and easily.... | | Teach Yourself VISUALLYDrawingDrawing is a very personal endeavor. Here, in this short introduction, the authors introduce ideas and motivations as to why they are attracted to the art of drawing.
The creation of the illusion of reality on a flat, blank surface always has and still fascinates me as an artist. With some good instruction, practice, and basic tools such... | | Domain Driven Data MiningIn the present thriving global economy a need has evolved for complex data analysis to enhance an organization’s production systems, decision-making tactics, and performance. In turn, data mining has emerged as one of the most active areas in information technologies. Domain Driven Data Mining offers state-of the-art research and... |
|
From Russia with Tough Love: Pavel's Kettlebell Workout for a Femme Fatale
In Russia, kettlebells have long been revered as the fitness-tool of choice for Olympic athletes, elite special forces and martial artists. The kettlebell’s ballistic movement challenges the body to achieve an unparalleled level of physical conditioning and overall strength.
But until now, the astonishing benefits of the... | | Fighting Computer Crime: A New Framework for Protecting Information
Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during... | | Pragmatic Guide to Subversion (Pragmatic Guides)
Subversion sets the standard in version control systems. Championed by open-source developers, Subversion is behind some of today's biggest and most important software, including Apache, FreeBSD, Ruby, and MediaWiki. But more than just a tool for open-source collaboration, Subversion has made a significant impact in the corporate... |
|
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)
We are entering the golden age of GPU computing. Since the introduction of CUDA in 2007, more
than 100 million computers with CUDA-capable GPUs have been shipped to end users. Unlike the
previous GPGPU shader programming models, CUDA supports parallel programming in C. From my
own experience in teaching CUDA programming, C programmers... | | UMTS Network Planning, Optimization, and Inter-Operation with GSM
The continuing explosive growth in mobile communication is demanding more spectrally
efficient radio access technologies than the prevalent second generation (2G) systems such as
GSM to handle just the voice traffic. We are already witnessing high levels of mobile
penetration exceeding 70% in some countries. It is anticipated that by... | | Security in Computing Systems: Challenges, Approaches and Solutions
This monograph on Security in Computing Systems: Challenges, Approaches and
Solutions aims at introducing, surveying and assessing the fundamentals of secu
rity with respect to computing. Here, “computing” refers to all activities which
individuals or groups directly or indirectly perform by means of computing sys
tems,... |
|
|
Result Page: 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 |