Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Better Available Light Digital Photography, Second Edition: How to Make the Most of Your Night and Low-Light Shots
Better Available Light Digital Photography, Second Edition: How to Make the Most of Your Night and Low-Light Shots

When learning and refi ning their skills, most photographers progress through three distinct phases. The fi rst stage occurs immediately after they get their fi rst “good” camera and begin discovering the potential of the medium. During this time, novice shooters photographically explore their world with a high level of...

Automating System Administration with Perl: Tools to Make You More Efficient
Automating System Administration with Perl: Tools to Make You More Efficient

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely...

Microsoft Office Excel 2003 Inside Out
Microsoft Office Excel 2003 Inside Out
Hey, you know your way around a spreadsheet—so now dig into Excel 2003 and really put your data to work! This supremely organized reference packs hundreds of time-saving solutions, troubleshooting tips, and handy workarounds in concise, fast answer format. Work smarter with core functions such as using worksheets and charts, analyzing data,...
Beyond Sarbanes-Oxley Compliance: Effective Enterprise Risk Management
Beyond Sarbanes-Oxley Compliance: Effective Enterprise Risk Management
“…full of pragmatic advice on achieving and sustaining compliance” (Supply Management, 5th January 2005)

Designed to lead financial managers from initial compliance with the Sarbanes-Oxley Act, through ongoing maintenance and monitoring, Beyond Sarbanes-Oxley Compliance helps
...
Cisco Internetworking with Windows NT & 2000
Cisco Internetworking with Windows NT & 2000
Guide to using Cisco hardware and software in a Microsoft environment With the announced Cisco/Microsoft partnership, just about all NT administrators will need a working knowledge of Cisco products and technologies. You'll find that know-how in Cisco Internetworking with Windows NT & 2000, by Anthony Velte, Toby Velte, and Amy Hanson. After an...
Microsoft BizTalk Server 2010 Unleashed
Microsoft BizTalk Server 2010 Unleashed

Microsoft BizTalk Server 2010 Unleashed is the 100% new, 100% practical developer’s guide to Microsoft’s most powerful version of BizTalk Server. Written by an expert team of Microsoft insiders and BizTalk MVPs, it reflects unsurpassed experience with all phases of BizTalk enterprise solutions...

Systems Engineering, Systems Thinking, and Learning: A Case Study in Space Industry (Understanding Complex Systems)
Systems Engineering, Systems Thinking, and Learning: A Case Study in Space Industry (Understanding Complex Systems)

This book focuses on systems engineering, systems thinking, and how that thinking can be learned in practice. It describes a novel analytical framework based on activity theory for understanding how systems thinking evolves and how it can be improved to support multidisciplinary teamwork in the context of system development and systems...

Learning from Data Streams: Processing Techniques in Sensor Networks
Learning from Data Streams: Processing Techniques in Sensor Networks
Sensor networks consist of distributed autonomous devices that cooperatively monitor an environment. Sensors are equipped with capacities to store information in memory, process this information and communicate with their neighbors. Processing data streams generated from wireless sensor networks has raised new research challenges over the last few...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Making PIC Microcontroller Instruments and Controllers
Making PIC Microcontroller Instruments and Controllers

Essential Design Techniques From the Workbench of a Pro

Harness the power of the PIC microcontroller unit with practical, common-sense instruction from an engineering expert. Through eight real-world projects, clear illustrations, and detailed schematics, Making PIC Microcontroller Instruments and Controllers...

Pay-Per-Click Search Engine Marketing: An Hour a Day
Pay-Per-Click Search Engine Marketing: An Hour a Day

The complete guide to a winning pay-per-click marketing campaign

Pay-per-click advertising-the "sponsored results" on search engine results pages-is increasingly being used to drive traffic to websites. Marketing and advertising professionals looking for a hands-on, task-based guide to every stage of creating and managing...

Microsoft SharePoint 2010 Unleashed
Microsoft SharePoint 2010 Unleashed

Using Microsoft SharePoint 2010 technologies, organizations can bring together, utilize, and collaborate with information from virtually any source. Microsoft SharePoint 2010 Unleashed is the most complete, practical resource for all administrators, managers, architects, users, and power users who want to make the...

unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy