|
|
|
|
Practical Programming in Tcl and Tk (3rd Edition) The Tcl/Tk best-seller, now completely updated for Tcl 8.2 and the Tcl Web Server!
Tcl/Tk 8.2 is the first scripting language that can handle enterprise-wide integration tasks that encompass Windows, Solaris, Macintosh, and other key platforms. Now, in this fully updated Third Edition, Tcl/Tk development team member and best-selling... | | Windows For Tablets For Dummies (For Dummies (Computer/Tech))
Just for you--Windows 8 from the tablet user's perspective
If you're an experienced Windows user, you don't need a guide to everything that Windows 8 can do, just to those tools and functions that work on your tablet. And so here it is. This new book zeros in on what you need to know to work best on your tablet... | | Beginning Windows 10: Do More with Your PC
Beginning Windows 10 takes you through the new features of this amazing new operating system, revealing some of its surprising capabilities, and helping you customize it to suit you. Whether you are new to Windows, or you want to get up to speed with the latest features and changes, this book has everything you need to get started. ... |
|
|
|
Managing Humans: Biting and Humorous Tales of a Software Engineering ManagerManaging Humans is a selection of the best essays from Michael Lopp's web site, Rands In Repose. Drawing on Lopp's management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other. It is a place full... | | SAP GRC For Dummies (Computer/Tech)Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole... | | Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... |
|
|
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |