Home | Amazing | Today | Tags | Publishers | Years | Search 
CrackBerry: True Tales of BlackBerry Use and Abuse (Books for Professionals by Professionals)
CrackBerry: True Tales of BlackBerry Use and Abuse (Books for Professionals by Professionals)

A delayed train, a dip in the conversation, an early morning hour with no sleep—during these moments, do you feel an overwhelming urge to grab your BlackBerry? Do you know someone else who does? If the answer is yes, then look no further than this one-of-a-kind book…

CrackBerry: True Tales of Blackberry Use and...

PostgreSQL 9.0 High Performance
PostgreSQL 9.0 High Performance

PostgreSQL database servers have a common set of problems they encounter as their usage gets heavier and requirements more demanding. You could spend years discovering solutions to them all, step by step as you encounter them. Or you can just look in here.

All successful database applications are destined to eventually run into...

Wearable Monitoring Systems
Wearable Monitoring Systems

As diverse as tomorrow’s society constituent groups may be, they will share the common requirements that their life should become safer and healthier, offering higher levels of effectiveness, communication and personal freedom. The key common part to all potential solutions fulfilling these requirements is wearable embedded systems,...

Discovering SQL: A Hands-On Guide for Beginners (Wrox Programmer to Programmer)
Discovering SQL: A Hands-On Guide for Beginners (Wrox Programmer to Programmer)

THE INFORMATIONAL DELUGE shows no signs of abating. We are inundated with data from the TV, from the Internet, and from advertisements stuffed in our mail boxes, virtual and otherwise. Unfortunately, as the quantity of information increased, its quality declined dramatically: Books were replaced by journals; then magazines; then newspapers;...

Programming Microsoft ASP.NET 4
Programming Microsoft ASP.NET 4

In the fall of 2004, at a popular software conference I realized how all major component vendors were advertising their ASP.NET products using a new word—Ajax. Only a few weeks later, a brand new module in my popular ASP.NET master class made its debut—using Ajax to improve the user experience. At its core, Ajax is a little...

Smashing CSS: Professional Techniques for Modern Layout
Smashing CSS: Professional Techniques for Modern Layout

CSS has become so phenomenally successful—almost as successful as HTML itself—that it is sometimes hard to grasp. It’s everywhere now, from Web browsers to app stores to chat clients, and it doesn’t show any signs of fading away. As the language’s use continues to spread, its capabilities continue to advance.

...
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)

With more than 400 million active users and growing, it’s hard to ignore the buzz about Facebook. It’s a hot topic these days, and shows no signs of letting up. If you’re ready to get to the bottom of this Internet sensation and find out how to use this social networking phenomenon for yourself,...

Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems
Ambient Intelligence for Scientific Discovery: Foundations, Theories, and Systems

For half a century, computer scientists have been working on systems for discovering lawful patterns in letters, numbers, words and images. The research has expanded into the computational study of the process of scientific discovery, producing such well-known AI programs as BACON and DENDRAL. However, autonomous discovery systems...

Manager's Guide to Social Media (Briefcase Books Series)
Manager's Guide to Social Media (Briefcase Books Series)

JUMP START PRODUCTIVITY, PROFITABLILITY, AND BUSINESS GROWTH WITH SOCIAL MEDIA!

Facebook, Twitter, and YouTube have changed everything. Some managers fear their employees will waste entire days using online social media. Smart managers, though, understand that social media is a powerful tool for engaging customers and growing...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

CURRENT Medical Diagnosis and Treatment 2009 (LANGE CURRENT Series)
CURRENT Medical Diagnosis and Treatment 2009 (LANGE CURRENT Series)

The #1 annually updated text in internal medicine -- trusted, authoritative, and essential to daily practice

A Doody's Core Title ESSENTIAL PURCHASE!

5 STAR DOODY'S REVIEW
"This book has the benefit of being updated yearly and thus has stood the test of time for recognizing what
...

Seeing the Big Picture: Business Acumen to Build Your Credibility, Career, and Company
Seeing the Big Picture: Business Acumen to Build Your Credibility, Career, and Company

An MBA in 180 pages, Seeing the Big Picture simplifies the complexities of businesses large and small and shows you how a deep understanding of your company can help build the credibility and career you want. And it can make your work more fulfilling and purpose-driven by highlighting how you influence the success of your team,...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy