Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Excel 2010 Formulas (Mr. Spreadsheet's Bookshelf)
Excel 2010 Formulas (Mr. Spreadsheet's Bookshelf)

Welcome to Excel 2010 Formulas. I approached this project with one goal in mind: To write the ultimate book about Excel 2010 formulas that would appeal to a broad base of users. That’s a fairly ambitious goal. But based on the feedback I received from the first four editions, I think I’ve accomplished it.

Excel is the...

Obstetric/Gynecologic, An Issue of Ultrasound Clinics, 1e (The Clinics: Radiology)
Obstetric/Gynecologic, An Issue of Ultrasound Clinics, 1e (The Clinics: Radiology)
This issue of the Ultrasound Clinics is dedicated to ultrasound imaging of the abdomen. Abdominal ultrasound is often the first-line imaging modality used to evaluate the kidneys, liver, gallbladder, pancreas, spleen, abdominal aorta, and other blood vessels in the abdomen, and as such can be extremely helpful in...
Clojure Programming
Clojure Programming

Clojure is a practical, general-purpose language that offers expressivity rivaling other dynamic languages like Ruby and Python, while seamlessly taking advantage of Java libraries, services, and all of the resources of the JVM ecosystem. This book helps you learn the fundamentals of Clojure with examples relating it to the languages...

Learning DCOM
Learning DCOM

DCOM -- the Distributed Component Object Model -- is a recent upgrade of a time-honored and well-tested technology promoted by Microsoft for distributed object programming. Now that components are playing a larger and larger part in Windows 98, Windows NT 4.0, and Windows 2000, every Windows programmer will want to understand the...

Cuckoo Malware Analysis
Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox

Overview

  • Learn how to analyze malware in a straightforward way with minimum technical skills
  • Understand the risk of the rise of document-based malware
  • Enhance your malware analysis concepts through illustrations, tips and tricks,...
Windows 10 Troubleshooting (Windows Troubleshooting Series)
Windows 10 Troubleshooting (Windows Troubleshooting Series)

Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...

Traumatic Dental Injuries in Children: A Clinical Guide to Management and Prevention
Traumatic Dental Injuries in Children: A Clinical Guide to Management and Prevention

This book is a clinical guide to the prevention and management of traumatic dental injuries, including crown and root fractures and luxation injuries, in children of all ages.  Readers will find clear descriptions of the challenges posed by the pediatric population, the evaluation of injuries, diagnosis, management, and...

Cryptography: Cracking Codes (Intelligence and Counterintelligence)
Cryptography: Cracking Codes (Intelligence and Counterintelligence)

While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryptionessentially the need to code information...

Sweet, Savory, and Free: Insanely Delicious Plant-Based Recipes without Any of the Top 8 Food Allergens
Sweet, Savory, and Free: Insanely Delicious Plant-Based Recipes without Any of the Top 8 Food Allergens
Eat Sweet, Savory, and Free with Debbie Adler’s Mouthwatering Plant-Based Recipes, Free of the Top 8 Allergens

In 2013, Debbie Adler’s Sweet Debbie’s Organic Treats: Allergy-Free and Vegan Recipes From the Famous Los Angeles Bakery proved that cooking for those with allergies and food
...
CCSP CSI Exam Cram 2 (Exam Cram 642-541)
CCSP CSI Exam Cram 2 (Exam Cram 642-541)

The Exam Cram Method of study focuses on exactly what you need to get certified now.

The Cisco SAFE Implementation Exam (which carries the examination ID number of 642-541) is intended to evaluate whether you understand the ideas behind a secured network architecture and...

Advanced Topics in Information Technology Standards And Standardization Research
Advanced Topics in Information Technology Standards And Standardization Research
More than five years have passed since Idea Group Publishing (IGP) published my first edited book on IT standards and standardisation. Back then, this was a fairly arcane topic, discussed in only a comparably small number of papers, in very few books, and at even fewer conferences.

Luckily, this situation is improving. More and more
...
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
Instant Messaging (IM) is quickly rivaling e-mail as the electronic communications tool of choice in offices worldwide. Already used by over 100 million people globally, IM will be used more often than e-mail by 2005. Employees at 70% of U.S. companies are expected to use IM this year -- whether for legitimate business reasons or for personal...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy