Home | Amazing | Today | Tags | Publishers | Years | Search 
The McGraw-Hill 36-Hour Course: Online Marketing (McGraw-Hill 36-Hour Courses)
The McGraw-Hill 36-Hour Course: Online Marketing (McGraw-Hill 36-Hour Courses)

The McGraw-Hill 36-Hour Course: Online Marketing is a book that will teach you about online marketing tools and how to apply them to support marketing credibility, visibility, and sellability. This book is written for students, entrepreneurs, marketers, and professionals—in short, anyone who wants to understand the art and...

The Nested Universal Relation Database Model (Lecture Notes in Computer Science)
The Nested Universal Relation Database Model (Lecture Notes in Computer Science)

During the 1980's the flat relational model (relational model), which was initiated by Codd in 1970, gained immense popularity and acceptance in the market place. One of the main reasons for this success is that the relational model provides physical data independences i.e. changing the physical organization of the database does not...

C++ Programming: Program Design Including Data Structures
C++ Programming: Program Design Including Data Structures

WELCOME TO THE FOURTH EDITION OF C++ Programming: Program Design Including Data Structures. Designed for a two semester (CS1 and CS2) C++ course, this text will provide a breath of fresh air to you and your students. The CS1 and CS2 courses serve as the cornerstone of the Computer Science curriculum. My primary goal is to motivate and...

Java(TM) Programming: From Problem Analysis to Program Design
Java(TM) Programming: From Problem Analysis to Program Design

Welcome to Java Programming: From Problem Analysis to Program Design, Fifth Edition. Designed for a first Computer Science (CS1) Java course, this text will provide a breath of fresh air to you and your students. The CS1 course serves as the cornerstone of the Computer Science curriculum. My primary goal is to motivate and excite all...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach
The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach

The modern world offers lots of readily available online resources for learning. Wikipedia, Google, news sources, millions of Web sites and blogs, even YouTube, offer access to information in nearly any subject that triggers your curiosity and interest. Nonetheless, I continue to believe that for deep understanding of something, nothing...

The Art and Science of Java
The Art and Science of Java

In The Art and Science of Java, Stanford professor and well-known leader in Computer Science Education Eric Roberts emphasizes the reader-friendly exposition that led to the success of The Art and Science of C. By following the recommendations of the Association of Computing Machinery’s Java Task Force, this first edition...

CSS for Print Designers
CSS for Print Designers

Print designers work in images, shapes, and color: not code. The last thing many of them want to do is to translate their work into mono-spaced tags and numbers, divs and ids. But print designers can't ignore the web and producing a design for the web has become a common part of a complete graphics package. And,...

Programming for TV, Radio & The Internet, Second Edition: Strategy, Development & Evaluation
Programming for TV, Radio & The Internet, Second Edition: Strategy, Development & Evaluation

Where do program ideas come from? How are concepts developed into saleable productions? Who do you talk to about getting a show produced? How do you schedule shows on the lineup? What do you do if a series is in trouble? The answers to these questions, and many more, can be found in this comprehensive, in-depth look at the roles and...

The Semantic Web: Research and Applications: 8th Extended Semantic Web Conference, ESWC 2011
The Semantic Web: Research and Applications: 8th Extended Semantic Web Conference, ESWC 2011

Every year ESWC brings together researchers and practitioners dealing with different aspects of semantic technologies. Following a successful re-launch in 2010 as a multi-track conference, the 8th Extended Semantic Web Conference built on the success of the ESWC conference series initiated in 2004. Through its extended concept this...

Succeeding with Technology (Sam 2010 Compatible Products)
Succeeding with Technology (Sam 2010 Compatible Products)

Most students entering college have already had years of exposure to computers and other digital technologies. Elementary and high school students use computers to write papers, create presentations, communicate with each other, conduct research, and entertain themselves. Cell phones, digital cameras, and iPods are standard equipment...

Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Result Page: 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy