Home | Amazing | Today | Tags | Publishers | Years | Search 
Access 2010 Bible
Access 2010 Bible

Welcome to the Microsoft Access 2010 Bible, your personal guide to a powerful, easy-to-use database-management system. This book is in its eleventh revision and has been totally rewritten for Microsoft Access 2010 with new text, new pictures, and a completely new and improved set of example files.

This book examines Access 2010...

Mastering Microsoft Exchange Server 2010
Mastering Microsoft Exchange Server 2010

A top-selling guide to Exchange Server-now fully updated for Exchange Server 2010.

Keep your Microsoft messaging system up to date and protected with the very newest version, Exchange Server 2010, and this comprehensive guide. Whether you're upgrading from Exchange Server 2007 SP1 or earlier, installing for the first time, or...

Plone 3 Multimedia
Plone 3 Multimedia

Plone is a free and open source content management system built on top of the Zope application server. Multimedia provides us with stunning interactive user experiences and many design options, but it requires discipline and knowledge to utilize it effectively so that we do not alienate our audiences. By providing an overview of multimedia...

ARRL's VHF Digital Handbook
ARRL's VHF Digital Handbook

Today's Amateur Radio operators are using digital radio applications for fun, technical achievement, and public service. And it s no wonder. Getting started often requires little more than a VHF radio and a computer.
Without complicated owners manual jargon ARRL s VHF Digital Handbook presents the material through a unique how-to
...

Be Your Own Sailing Coach: 20 Goals for Racing Success (Wiley Nautical)
Be Your Own Sailing Coach: 20 Goals for Racing Success (Wiley Nautical)

One of the reasons why it is so hard to improve your racing is that sailing is such a time-intensive sport. If you are running, you can start your training session fi ve minutes after you’ve shut your front door, whereas it may take a sailor fi ve hours (or more) to drive to the venue, fully rig the boat and get on the water. This is...

Gods and Goddesses in Greek Mythology
Gods and Goddesses in Greek Mythology

The word myth comes from the Greek word mythos, which means “story” or “speech.”1 Myth is often the word used to describe a story that explains events or objects that occur in nature, such as the creation of certain flowers or animals, the location of deserts or oceans, and even the origin and cycle of the seasons....

Building the Realtime User Experience: Creating Immersive and Interactive Websites
Building the Realtime User Experience: Creating Immersive and Interactive Websites

The Web is increasingly happening in realtime. With websites such as Facebook and Twitter leading the way, users are coming to expect that all sites should serve content as it occurs -- on smartphones as well as computers. This book shows you how to build realtime user experiences by adding chat, streaming content, and including more...

Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide

Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. Now, one of the world’s leading IT innovators explains what it all means—coherently, thoroughly, and authoritatively.

Writing for IT executives, architects, and developers
...

Sams Teach Yourself Android Application Development in 24 Hours
Sams Teach Yourself Android Application Development in 24 Hours

Full Color!

 

In just 24 sessions of one hour or less, learn how to build powerful applications for the world’s first complete, open, and free mobile platform: Android. Using this book’s straightforward, step-by-step approach, you’ll...

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Cyberthreats: The Emerging Fault Lines of the Nation State
Cyberthreats: The Emerging Fault Lines of the Nation State

As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an...

JavaFX 1.2 Application Development Cookbook
JavaFX 1.2 Application Development Cookbook

JavaFX Script enables you to easily create rich Internet applications by embedding multimedia components. Although you can create stylish Internet applications by modifying these default components, even advanced users find it challenging to create impressive feature-rich Internet applications with JavaFX. Also, there are limited JavaFX...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy