Home | Amazing | Today | Tags | Publishers | Years | Search 
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)

With more than 400 million active users and growing, it’s hard to ignore the buzz about Facebook. It’s a hot topic these days, and shows no signs of letting up. If you’re ready to get to the bottom of this Internet sensation and find out how to use this social networking phenomenon for yourself,...

Better PowerPoint (R): Quick Fixes Based On How Your Audience Thinks
Better PowerPoint (R): Quick Fixes Based On How Your Audience Thinks

Presentations: We´ve all sat through them, wondering why we´re there; or we´ve given them, wondering whether the audience cares. This is a book about how to make presentations effective and therefore more interesting to the audience members.

Years ago, I was at a conference where one of the most...

Inkscape: Guide to a Vector Drawing Program (4th Edition) (SourceForge Community Press)
Inkscape: Guide to a Vector Drawing Program (4th Edition) (SourceForge Community Press)

This book serves as both a textbook and a reference for using Inkscape to produce high-quality drawings. It includes a series of tutorials followed by chapters that cover completely each facet of the Inkscape program. The book is full of tips and notes to enable the user to make the best use of the program.

Inkscape is an open...

Programming Like a Pro for Teens
Programming Like a Pro for Teens

Are you ready to learn how to program a computer? You'll do just that in this book. PROGRAMMING LIKE A PRO FOR TEENS is written in a friendly, unassuming voice that makes it possible for you to master the ideas and concepts that professionals use for programming every day. You learn algorithmic thinking and problem-solving in addition to...

Software Engineering: A Practitioner's Approach
Software Engineering: A Practitioner's Approach

When computer software succeeds—when it meets the needs of the people who use it, when it performs flawlessly over a long period of time, when it is easy to modify and even easier to use—it can and does change things for the better. But when software fails—when its users are dissatisfied, when it is error prone, when...

Database Processing (12th Edition)
Database Processing (12th Edition)

The 12th edition of Database Processing: Fundamentals, Design, and Implementation refines the organization and content of this classic textbook to reflect a new teaching and professional workplace environment. Students and other readers of this book will benefit from new content and features in this edition.

...
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications

Architect IBM® WebSphere® Applications for Maximum Performance, Security, Flexibility, Usability, and Value Successful, high-value WebSphere applications begin with effective architecture. Now, one of IBM’s leading WebSphere and WebSphere Portal architects offers a hands-on,...

Representations and Techniques for 3D Object Recognition & Scene Interpretation
Representations and Techniques for 3D Object Recognition & Scene Interpretation

3D scene understanding and object recognition are among the grandest challenges in computer vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo, edge detection, and segmentation, could be viewed as subtasks within scene understanding and recognition. Many of these applicable methods are...

The Nested Universal Relation Database Model (Lecture Notes in Computer Science)
The Nested Universal Relation Database Model (Lecture Notes in Computer Science)

During the 1980's the flat relational model (relational model), which was initiated by Codd in 1970, gained immense popularity and acceptance in the market place. One of the main reasons for this success is that the relational model provides physical data independences i.e. changing the physical organization of the database does not...

Knowledge Representation and Reasoning Under Uncertainty: Logic at Work
Knowledge Representation and Reasoning Under Uncertainty: Logic at Work

This volume is based on the International Conference Logic at Work, held in Amsterdam, The Netherlands, in December 1992. The 14 papers in this volume are selected from 86 submissions and 8 invited contributions and are all devoted to knowledge representation and reasoning under uncertainty, which are core issues of formal artificial...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Result Page: 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy