|
|
|
|
|
|
Major Donors: Finding Big Gifts in Your Database and OnlineA winning approach to developing international fundraising strategies
Philanthropy is in a renewed golden age. People want to help, to make a difference, to ensure that the things they value will flourish. In order to capitalize on potential prospects, many nonprofit professionals focus solely on the research of, or communication with,... | | Managing Mailing Lists: Majordomo, LISTSERV, Listproc, and SmartList
Would you like to set up an electronic discussion forum for your customers? Or how about a mailing list to announce meetings of your local hobby group? Email is the universal Internet application, which makes mailing lists an ideal vehicle for creating electronic communities. All you need to run a mailing list is access to a system that is... | | OSPF and IS-IS: Choosing an IGP for Large-Scale NetworksThe practical guide to large-scale networking with OSPF and IS-IS
This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting... |
|
Mule in ActionMule is the most widely used open source ESB-with millions of downloads- providing an alternative to expensive commercial options. Mule in Action is a comprehensive tutorial designed for working Java developers. This authoritative book explores the architecture and the main features of version Mule 2 through numerous running examples. It starts... | | Macworld iPhone Superguide, Second EditionFor iPhone, iPod, iPod touch, Mac and Windows users, this book details and simplifies the best use of your iPhone features. This Second Edition brings back the popular iPhone Superguide, updated for iPhone, iPhone 3G, and iPod touch.
Our experts share how to master hidden features easily, connect to nearby... | | Understanding Cryptography: A Textbook for Students and PractitionersCryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a... |
|
|
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 |