Home | Amazing | Today | Tags | Publishers | Years | Search 
Adaptive Web Design: Crafting Rich Experiences with Progressive Enhancement
Adaptive Web Design: Crafting Rich Experiences with Progressive Enhancement
One glorious afternoon in March, 2006, as a friend and I hurried past Austin’s Downtown Hilton Hotel to catch the next session of the SXSW Interactive Festival, a young stranger arrested our progress. With no introduction or preliminaries, he announced that he was available to speak at An Event Apart, a conference for web designers that...
MOS 2010 Study Guide for Microsoft® Excel
MOS 2010 Study Guide for Microsoft® Excel

Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can use...

MOS 2010 Study Guide for Microsoft® Excel® Expert
MOS 2010 Study Guide for Microsoft® Excel® Expert
Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you...
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)

IBM’s Definitive One-Stop Guide to IMS Versions 12, 11, and 10: for Every IMS DBA, Developer, and System Programmer

 

Over 90% of the top Fortune® 1000 companies rely on IBM’s Information Management System...

Introduction to Networking Basics
Introduction to Networking Basics
Today’s students have different goals, different life experiences, and different academic backgrounds, but they are all on the same path to success in the real world. This diversity, coupled with the reality that these learners often have jobs, families, and other commitments, requires a fl exibility that our...
CompTIA Healthcare IT Technician HIT-001 Authorized Cert Guide (Cert Guides)
CompTIA Healthcare IT Technician HIT-001 Authorized Cert Guide (Cert Guides)

This study guide helps you master all the topics on the new Healthcare IT Technician HIT-001 exam, including

  • Healthcare IT roles and trends
  • Standards agencies, laws, and regulations
  • ...
ATDD by Example: A Practical Guide to Acceptance Test-Driven Development
ATDD by Example: A Practical Guide to Acceptance Test-Driven Development
There is a curious symmetry to the way this book presents Acceptance Test- Driven Development and the way software is developed with ATDD. Just as there is an art to picking the specific examples of program behavior that will elicit the correct general behavior for the system, there is an art to picking specific examples of a...
MOS 2010 Study Guide for Microsoft® Word Expert
MOS 2010 Study Guide for Microsoft® Word Expert

Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can use...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
CompTIA A+ Complete Lab Manual
CompTIA A+ Complete Lab Manual

Boost your understanding of CompTIA A+ exam principles with practical, real-world exercises

Designed to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given day. It supports the theory explained in the test-prep...

The Official VCP5 Certification Guide (VMware Press Certification)
The Official VCP5 Certification Guide (VMware Press Certification)

Trust the bestselling Official Cert Guide series from VMware Press to help you learn, prepare, and practice for VCP5 exam success. They are the only VMware authorized self-study books and are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy