Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft  Windows PowerShell(TM) Step By Step
Microsoft Windows PowerShell(TM) Step By Step

Your hands-on, step-by-step guide to automating administration with Windows PowerShell.

Teach yourself the fundamentals of Windows PowerShell command line interface and scripting language. Written by a leading scripting expert, this tutorial delivers self-paced labs, timesaving tips, and hands-on sample scripts for automating Windows...

Artificial Intelligence in Education (Frontiers in Artificial Intelligence and Applications)
Artificial Intelligence in Education (Frontiers in Artificial Intelligence and Applications)
The 12th International Conference on Artificial Intelligence in Education (AIED-2005) is being held July 18–22, 2005, in Amsterdam, the beautiful Dutch city near the sea. AIED-2005 is the latest in an on-going series of biennial conferences in AIED dating back to the mid-1980’s when the field emerged from a synthesis of artificial...
Microsoft  Office Excel  2007 Visual Basic  for Applications Step by Step (BPG-step by Step)
Microsoft Office Excel 2007 Visual Basic for Applications Step by Step (BPG-step by Step)

Experience learning made easy, and quickly teach yourself Microsoft Office Excel 2007 Visual Basic for Applications (VBA)--one step at a time! Work at your own pace through the easy numbered steps and practice files, and master the fundamentals for using VBA to create custom software solutions and automating tasks in Excel 2007--no developer...

Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
ECAI 2006, 17th European Conference on Artificial Intelligence:  Volume 141 Frontiers in Artificial Intelligence and Applications
ECAI 2006, 17th European Conference on Artificial Intelligence: Volume 141 Frontiers in Artificial Intelligence and Applications
In the summer of 1956, John McCarthy organized the famous Dartmouth Conference which is now commonly viewed as the founding event for the field of Artificial Intelligence. During the last 50 years, AI has seen a tremendous development and is now a well-established scientific discipline all over the world. Also in Europe AI is in excellent shape, as...
XML in Office 2003: Information Sharing with Desktop XML
XML in Office 2003: Information Sharing with Desktop XML

What do you give the software that has everything?

XML, of course!

Microsoft Office is the most successful productivity product in the history of computers, with over 300 million users around the world. Few of them use all of the features in Office now, so why add...

Architect's Portable Handbook
Architect's Portable Handbook
FROM CONCEPTION TO COMPLETION, NO ARCHITECTURAL PROJECT SHOULD PROCEED WITHOUT THIS BOOK!

Includes the new International and NFPA building codes!

When it comes to providing architects with quick, accurate guidance for a complete range of on-the-job issues, no book matches The Architect's Portable...

Photoshop CS3 Workflow: The Digital Photographer's Guide (Tim Grey Guides)
Photoshop CS3 Workflow: The Digital Photographer's Guide (Tim Grey Guides)
Set up an effective workflow and set your imagination free

If you're like most artists, the idea of structuring your work may seem at odds with true creativity, but you'll be surprised to learn from digital imaging expert Tim Grey that just the opposite is true. This latest edition of his bestselling guide to Photoshop shows you how proper...

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Digital Futures: Living in a dot.com World
Digital Futures: Living in a dot.com World
Beyond the hype about dot-coms, WAP phones and dot-com entrepreneurs, what impacts will e-commerce have on society? How will it affect jobs and local communities? What will it mean for energy use, transport and the future shape of our cities? How can we ensure that everyone enjoys the benefits of the new digital technologies?

With
...
Knowledge Discovery in Bioinformatics: Techniques, Methods, and Applications (Wiley Series in Bioinformatics)
Knowledge Discovery in Bioinformatics: Techniques, Methods, and Applications (Wiley Series in Bioinformatics)
Wiley Series on Bioinformatics: Computational Techniques and Engineering

Discover how data mining is fueling new discoveries in bioinformatics

As the field of bioinformatics continues to flourish, producing enormous amounts of new data, the need for sophisticated methods of data mining to better manage and extract meaning from...

The Art of Computer Game Design
The Art of Computer Game Design
The central premise of this book is that computer games constitute a new and as yet poorly developed art form that holds great promise for both designers and players.

This premise may seem laughable or flippant. How could anybody classify the likes of SPACE INVADERS and PAC MAN as art? How can TEMPEST or MISSILE COMMAND compare with
...
Result Page: 1110 1109 1108 1107 1106 1105 1104 1103 1102 1101 1100 1099 1098 1097 1096 1095 1094 1093 1092 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy