 |
|
|
 Access 2010 Programmer's Reference (Wrox Programmer to Programmer)
A comprehensive guide to programming for Access 2010 and 2007
Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these... |  |  Food Protein Analysis: Quantitative Effects On Processing
There is no book dealing with food protein analysis exclusively, that is, with the analysis of proteins in the food systeni. This books attempts to lill this niche. Protein analysis comes in two forms: 1) Quantitative analysis, and 2) fractionation and cllaracterization. The first activity is described here. This publication provides a... |  |  VBA and Macros: Microsoft Excel 2010 (MrExcel Library)
Use Excel 2010 VBA and macros to automate virtually any routine task, and save yourself hours, days, maybe even weeks. Then learn how to make Excel do things you thought were simply impossible! This book reveals scripting techniques you won’t find anywhere else and shows you how to create automated reports that are... |
|
|
 Oracle Self-Service Applications (Osborne ORACLE Press Series)
Maximize the Capabilities of Oracle Self-Service Applications
Get complete coverage of Oracle E-Business Suite's self-service modules, including Oracle iProcurement, Oracle Internet Expenses, Oracle iSupplier Portal, and Oracle iReceivables, inside this Oracle Press guide. Oracle Self-Service Applications discusses the... |  |  Documentum 6.5 Content Management Foundations
EMC Documentum is a leading Enterprise Content Management technology platform that helps enterprises to streamline the capture, processing, and distribution of business information including documents, records, e-mails, web content, images, reports, and digital assets. EMC Proven Professional is an exam-based certification program, which... |  |  Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |
|
Result Page: 86 85 84 83 82 81 80 79 78 77 |