Home | Amazing | Today | Tags | Publishers | Years | Search 
Designing Forms for SharePoint and InfoPath: Using InfoPath Designer 2010 (2nd Edition)
Designing Forms for SharePoint and InfoPath: Using InfoPath Designer 2010 (2nd Edition)

Over the past decade or so, Extensible Markup Language (XML) has become more widely used than ever before as a means of transferring data between applications and even between organizations. XML provides a standard protocol with which these applications and organizations can communicate. Using XML Schema, a company can define a...

The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

SPSS 13.0 Base Users Guide
SPSS 13.0 Base Users Guide

SPSS for Windows provides a powerful statistical analysis and data management system in a graphical environment, using descriptive menus and simple dialog boxes to do most of the work for you. Most tasks can be accomplished simply by pointing and clicking the mouse.

SPSS Base 13.0 Users Guide provides a thorough explanation...

Oracle APEX 4.0 Cookbook
Oracle APEX 4.0 Cookbook

Oracle Application Express 4.0 is a rapid web application development tool that works with the Oracle database. Using features like Plug-ins and Dynamic Actions, APEX helps you build applications with the latest techniques in AJAX and JavaScript.

The Oracle Application Express 4.0 Cookbook shows you recipes to develop and deploy...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

Knowledge Mapping and Management
Knowledge Mapping and Management

Knowledge Management is fast becoming a hot topic of discussion and research. The capture, use, production and storage of knowledge is an issue of paramount importance for businesses, universities, public and private organizations. Because this is such an important topic, it is essential for researchers, academicians and managers to...

Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

Automated Deduction in Geometry: Second International Workshop, ADG'98, Beijing
Automated Deduction in Geometry: Second International Workshop, ADG'98, Beijing
The Second International Workshop on Automated Deduction in Geometry (ADG ’98) was held in Beijing, China, August 1–3, 1998. An increase of interest in ADG ’98 over the previous workshop ADG ’96 is represented by the notable number of more than 40 participants from ten countries and the strong technical...
LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks
LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

A concise introduction to IMT-Advanced Systems, including LTE-Advanced and WiMAX

There exists a strong demand for fully extending emerging Internet services, including collaborative applications and social networking, to the mobile and wireless domain. Delivering such services can be possible only through realizing broadband...

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Getting Started with Oracle Data Integrator 11g: A Hands-on Tutorial
Getting Started with Oracle Data Integrator 11g: A Hands-on Tutorial

The May 26, 2011 edition of the Economist magazine cites a report by the the McKinsey Global Institute (MGI) about data becoming a factor of production, such as physical or human capital. Across the industry, enterprises are investing significant resources in harnessing value from vast amounts of data to innovate, compete, and reduce...

Natural and Wood Fibre Reinforcement in Polymers (Rapra Review Reports)
Natural and Wood Fibre Reinforcement in Polymers (Rapra Review Reports)
The use of composite materials dates from centuries ago, when it all started with natural fibres. In ancient Egypt some 3,000 years ago, clay was reinforced by straw to build walls. Later on the natural fibre lost much of its interest.

This report examines the different fibre types available and the current research. The...

Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy