 |
|
|
|
|
 Access 2007 VBA Programmer's ReferenceAccess 2007 VBA Programmer's Reference
Written by Access MVPs and Microsoft Access testers, this resource will give you the tools to leverage Access 2007's built-in functionality and VBA in order to build more dynamic applications. It explores all aspects of VBA programming for Access and describes the latest innovations. You'll also find... |  |  Encyclopedia of Civil War ShipwrecksOn the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,... |  |  Mastering Windows Vista Business: Ultimate, Business, and EnterpriseIn-depth Coverage of Windows Vista Ultimate, Business, and Enterprise
Learn to install, configure, run, and troubleshoot the professional versions of Vista in this comprehensive new guide from two leading Windows authorities. From Vista's all-new interface, 32-bit/64-bit architecture, and advanced security features to its fantastic new... |
|
 Professional Windows PowerShell (Programmer to Programmer)Professional Windows® PowerShell
Forget everything you know about the Windows command line because you're about to enter a whole new ballgame. Windows PowerShell provides a new environment for interactive exploration and administration of Windows machines that's different from and more consistent than what you've previously used on Windows... |  |  |  |  Windows Forensics: The Field Guide for Corporate Computer InvestigationsThe evidence is in--to solve Windows crime, you need Windows tools
An arcane pursuit a decade ago, forensic science today is a household term. And while the computer forensic analyst may not lead as exciting a life as TV's CSIs do, he or she relies just as heavily on scientific principles and just as surely solves crime.
Whether... |
|
 Professional Rootkits (Programmer to Programmer)Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for... |  |  Web ArchivingThe public information available on the Web today is larger than information distributed on any other media. The raw nature of Web content, the unpredictable remote changes that can affect it, the wide variety of formats concerned, and the growth in data-driven websites make the preservation of this material a challenging task, requiring specific... |  |  MCSE Training Kit Microsoft Windows 2000 ProfessionalThis official Microsoft training kit teaches IT professionals how to install, configure, and administer the Windows 2000 Professional desktop operating system-as they prepare for the corresponding MCP exam. Topics include setting up and troubleshooting the software; monitoring and optimizing system resources such as files, printers, and... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 |