Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Guide to Salesforce Communities: Building, Enhancing, and Managing an Online Community with Salesforce Community Cloud
Practical Guide to Salesforce Communities: Building, Enhancing, and Managing an Online Community with Salesforce Community Cloud

Whether you are brand new to the world of Salesforce communities or you are looking to take your Community Cloud knowledge to the next level, this detailed guide will help you to build and manage a Salesforce community by leveraging the declarative power of the platform with clicks, not code.

Each Salesforce community is...

Birth of the Binge: Serial TV and the End of Leisure (Contemporary Approaches to Film and Media Series)
Birth of the Binge: Serial TV and the End of Leisure (Contemporary Approaches to Film and Media Series)

Birth of the Binge: Serial TV and the End of Leisure describes and details serial television and "binge watching," the exceedingly popular form of contemporary television viewing that has come to dominance over the past decade. Author Dennis Broe looks at this practice of media consumption by suggesting that...

Black Art of Java Game Programming
Black Art of Java Game Programming
Gaming on the Web is the next blockbuster business. Have any doubts? The video game industry,
which already eclipses Hollywood in terms of revenue, targets the Web as the next huge growth area.
Software developers are busily porting games to the online environment, or developing entirely new
ones. And numerous popular Web sites, many
...
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

Inside Microsoft SQL Server 2005: T-SQL Querying
Inside Microsoft SQL Server 2005: T-SQL Querying
A comprehensive, hands-on reference for database developers and administrators, this book focuses on advanced querying techniques using Transact-SQL (T-SQL), the database programming language built into SQL Server. Includes code and table examples.

Key Book Benefits:
  • Delivers practical, hands-on guidance on...
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Rang & Dale's Pharmacology: With STUDENT CONSULT  Online Access
Rang & Dale's Pharmacology: With STUDENT CONSULT Online Access
A straightforward way to master a complex subject! This bestselling textbook presents all the knowledge you need to get through your pharmacology course and beyond-using a clear and accessible approach that makes the material easy and interesting to learn. Progressing logically from a molecular understanding of receptors and drug actions to the...
Digital Photography For Seniors For Dummies
Digital Photography For Seniors For Dummies

Take the mystery out of digital photography and join the fun!

You don't need to be a professional photographer or a technology expert to take great digital photos! This down-to-basics guide makes it easy to choose the right camera, understand all its dials and controls, take good pictures, make them look even better with your...

The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

unlimited object storage image
Result Page: 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy