Home | Amazing | Today | Tags | Publishers | Years | Search 
Guerilla Data Analysis Using Microsoft Excel
Guerilla Data Analysis Using Microsoft Excel
This book includes step-by-step examples and case studies that teach users the many power tricks for analyzing data in Excel. These are tips honed by Bill Jelen, “MrExcel,” during his 10-year run as a financial analyst charged with taking mainframe data and turning it into useful information quickly. Topics include perfectly sorting...
Digital Character Animation 2, Volume II: Advanced Techniques (Digital Character Animation)
Digital Character Animation 2, Volume II: Advanced Techniques (Digital Character Animation)
At last, George Maestri’s advanced-techniques volume of his groundbreaking [digital] Character Animation book. Completely new: No updated material from the first volume (covering Essential Techniques) or from the first edition (published in 1996 and now out of print). If you are into 3D animation at all—learning, practicing (or managing...
Unix Unleashed/Book and CD
Unix Unleashed/Book and CD
Given life by Turing Award winning Bell Labs computer scientist Ken Thompson at Murray Hill, N.J., in August 1969, UNIX spent its early years as a research curiosity. When I met up with Unix in the summer of '82, however, it already possessed the one characteristic that destined it to dominate a major chunk of the world's market for operating...
Linux Cluster Architecture (Kaleidoscope)
Linux Cluster Architecture (Kaleidoscope)
Cluster computers provide a low-cost alternative to multiprocessor systems for many applications. Building a cluster computer is within the reach of any computer user with solid C programming skills and a knowledge of operating systems, hardware, and networking. This book leads you through the design and assembly of such a system, and shows you how...
PC Interfacing and Data Acquisition: Techniques for Measurement, Instrumentation and Control.
PC Interfacing and Data Acquisition: Techniques for Measurement, Instrumentation and Control.
Until fairly recently most scientific data-gathering systems and industrial control procedures were based on electromechanical devices such as chart recorders and analogue gauges. The capability to process and analyse data was rather limited (and in some cases error prone) unless one had access to a minicomputer or mainframe. Today, that situation...
Beginning Microsoft Visual Basic 2008 (Wrox Beginning Guides)
Beginning Microsoft Visual Basic 2008 (Wrox Beginning Guides)
Beginning Microsoft Visual Basic 2008

If you want to learn Visual Basic 2008 so you can create powerful, database-driven applications, then this is the book for you. It walks you through this robust programming language and shows you how to build a variety of different Windows® applications and web services. Along the...

Visual Design for the Modern Web
Visual Design for the Modern Web
Just as great artists must understand their tools, great Web designers must understand the technology behind their art. In Visual Design for the Web, author Penny McIntire shows novice Web designers how to use their tools--including HTML, CSS, and JavaScript--in conjunction with the principles of aesthetics and usability to become masters of their...
Database Archiving: How to Keep Lots of Data for a Very Long Time (The MK/OMG Press)
Database Archiving: How to Keep Lots of Data for a Very Long Time (The MK/OMG Press)
This book is about archiving database data. It is not a general purpose book about archiving. It is also not a book about archiving any or all kinds of data. It is about archiving data in traditional IT databases (e.g., relational databases, hierarchical databases, and structured data in computer files). Examples of source data for archiving are...
Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

Linux Performance Tuning and Capacity Planning (Kaleidoscope)
Linux Performance Tuning and Capacity Planning (Kaleidoscope)

Covering topics from analysis tools to kernel tuning, to capacity management, this book offers a single point of reference for what you need to know. Anyone who has ever had to speed existing operations or project usage patterns for future loads, knows that tracking down the relevant information can be a difficult task. That's why this book has...

Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
A complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors

This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect
...
C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy