 |
|
|
 |  |  |  |  Web Campaigning (Acting with Technology)Winner, 2008 Doris Graber Outstanding Book Award presented by the Political Communication Section of the American Political Science Association. The use of the Web in U.S. political campaigns has developed dramatically over the course of the last several election seasons. In Web Campaigning, Kirsten Foot and... |
|
 Learn Objective-C on the Mac (Learn Series)Take your coding skills to the next level with this extensive guide to Objective–C, the native programming language for developing sophisticated software applications for Mac OS X. Objective–C is a powerful, object–oriented extension of C, making this book the perfect follow–up to Dave Mark’s... |  |  |  |  Power Systems Electromagnetic Transients Simulation (IEE Power & Energy Series, 39)Accurate knowledge of electromagnetic power system transients is crucial to the operation of an economic, efficient and environmentally friendly power systems network without compromising on the reliability and quality of Electrical Power Supply. Electromagnetic transients simulation (EMTS) has become a universal tool for the analysis of power... |
|
 The Definitive Guide to Grails, Second Edition (Expert's Voice in Web Development)The rise of Ruby on Rails has signified a huge shift in how we build web applications today; it is a fantastic framework with a growing community. There is, however, space for another such framework that integrates seamlessly with Java. Thousands of companies have invested in Java, and these same companies are losing out on the benefits of a... |  |  Programming Microsoft Dynamics CRM 4.0 (Pro-Developer)Announcing a fully revised second edition of this popular SELF-PACED TRAINING KIT designed to help maximize your performance on 70-536, a core exam for the MCTS and MCPD certifications. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features... |  |  GFI Network Security and PCI Compliance Power ToolsUse GFI's Tools to Search for Vulnerabilities in Your Network!
For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.... |
|
Result Page: 354 353 352 351 350 349 348 347 346 345 344 |