Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Major Donors: Finding Big Gifts in Your Database and Online
Major Donors: Finding Big Gifts in Your Database and Online

A winning approach to developing international fundraising strategies

Philanthropy is in a renewed golden age. People want to help, to make a difference, to ensure that the things they value will flourish. In order to capitalize on potential prospects, many nonprofit professionals focus solely on the research of, or communication with,...

Public Administration in Europe: The Contribution of EGPA (Governance and Public Management)
Public Administration in Europe: The Contribution of EGPA (Governance and Public Management)
This book considers the ways in which public administration (PA) has been studied in Europe over the last forty years, and examines in particular the contribution of EGPA, the European Group for Public Administration, both to the growth of a truly pan-European PA, and to the future of PA in Europe. The book provides a lively reflection on the...
Delphi/Kylix Database Development
Delphi/Kylix Database Development
The aim of this book is to teach cross-platform database programming to Delphi 6 or Kylix programmers. The book will assume the reader has a basic understanding of databases, such as what tables, rows, columns, fields, indexes, etc. are. It will also assume the reader has a working knowledge of Delphi and/or Kylix. A thorough investigation of...
PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Javascript Programmer's Reference
Javascript Programmer's Reference
The book is aimed at people who already have some knowledge of JavaScript and need a companion volume to their daily work. It is primarily aimed at the experienced practitioner, and so does not attempt to be a tutorial for the beginner.

For a tutorial book, we suggest Paul Wilton's Beginning
...
Researching Learning in Virtual Worlds (Human-Computer Interaction Series)
Researching Learning in Virtual Worlds (Human-Computer Interaction Series)

Most of the chapters in this book are extended papers from Research Learning in Virtual Environments (reLIVE08), an international conference held by the UK Open University in Milton Keynes in November 2008. Authors of the best papers and presentations from the conferences were invited to contribute to Research Learning in Virtual Worlds, the...

App Savvy: Turning Ideas into iPad and iPhone Apps Customers Really Want
App Savvy: Turning Ideas into iPad and iPhone Apps Customers Really Want
How can you make your iPhone or iPad app stand out in the highly competitive App Store? While many books simply explore the technical aspects of iPhone and iPad app design and development, App Savvy focuses on the business, product, and marketing elements critical to pursuing, completing, and selling...
Quantum Wells, Wires and Dots: Theoretical and Computational Physics of Semiconductor Nanostructures
Quantum Wells, Wires and Dots: Theoretical and Computational Physics of Semiconductor Nanostructures
This book is aimed at providing all of the essential information, both theoretical and computational, in order that the reader can, starting from essentially nothing, understand how the electronic, optical and transport properties of semiconductor heterostructures are calculated. However, perhaps more importantly, starting from this low...
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
Routing, Flow, and Capacity Design in Communication and Computer Networks
Routing, Flow, and Capacity Design in Communication and Computer Networks
"Pioro and Medhis book is very refreshing and gives a comprehensive view of network design. It unifies many important topics on network design that are not found in one place; for example, this book provides the first thorough treatment of multi-layer design. Practitioners will find the book useful due to its development of both models and...
Multimedia Wireless Networks: Technologies, Standards and QoS
Multimedia Wireless Networks: Technologies, Standards and QoS
  • Integrating QoS in wireless multimedia network design
  • Delivering QoS in WLANs, WPANs, WMANs, cellular, and satellite networks
  • Covers every leading current and emerging wireless network standard

Integrate QoS into virtually any multimedia wireless network

From...

Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy