Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Word Hacks : Tips & Tools for Taming Your Text
Word Hacks : Tips & Tools for Taming Your Text

Few software applications are as ubiquitous as Microsoft Word, which has been around for more than 20 years—practically an eternity in computer time. Even as competitors, such as OpenOffice.org, emerge from the open source community, their success relies heavily on how much they look and act like Word. When most people...

Surgery of Spinal Tumors
Surgery of Spinal Tumors

Abundantly illustrated with more than 1,850 figures, this comprehensive monograph describes the experience gained through the treatment of patients with spinal tumors over a 25-year period. It covers clinical presentations and neuroradiological features of intramedullary, extramedullary, and extradural spinal tumors. Coverage provides...

Hack Proofing Windows 2000 Server
Hack Proofing Windows 2000 Server
Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include...
Sams Teach Yourself Visual Basic 6 in 21 Days, Professional Reference
Sams Teach Yourself Visual Basic 6 in 21 Days, Professional Reference
"Wordy and plodding, but a nicely paced introduction to the Visual Basic world."

This book has all the earmarks of a series designed in-house. This is a bad thing. It means the book contains elements that obviously are the result of compromises made by people sitting through endless meetings and eventually settling on the...

Effectiveness of Air Force Science and Technology Program Changes
Effectiveness of Air Force Science and Technology Program Changes

Under mandate of Section 253, Study and Report on Effectiveness of Air Force Science and Technology Program Changes, of the Fiscal Year 2002 National Defense Authorization Act (Public Law 107-107; U.S. Congress, 2001), the U.S. Air Force contracted with the National Research Council (NRC) to conduct the present study. In response,...

Still Image and Video Compression with MATLAB
Still Image and Video Compression with MATLAB
The term “video compression” is now a common household name. The field of still image and video compression has matured to the point that it is possible to watch movies on a laptop computer. Such is the rapidity at which technology in various fields has advanced and is advancing. However, this creates a need for some to...
Convergence of Project Management and Knowledge Management
Convergence of Project Management and Knowledge Management

Knowledge is power, but this is especially true for teams carrying out a project. As in other arenas, the effective use of knowledge is possible only if it is readily accessible, well organized, properly analyzed, and competently disseminated to meet the project needs. Knowledge gained from project failures or successes is vital for the long...

The Professional Development of Teachers: Practice and Theory
The Professional Development of Teachers: Practice and Theory
We have subtitled this book ‘Practice and Theory’ because that is the order in which we plan to deal with the subject. We have been running and evaluating programmes for the professional development of teachers since 1970 and the first section of the book will describe some of that practice and the principles which have emerged, and...
The Relational Model for Database Management: Version 2
The Relational Model for Database Management: Version 2
Today, if you have a well-designed database management system, you have the keys to the kingdom of data processing and decision support. That is why there now exists a prototype machine whose complete design is based on the relational model. Its arithmetic hardware is a quite minor part of thearchitecture. In fact, the old term "computer...
Blogging to Drive Business: Create and Maintain Valuable Customer Connections
Blogging to Drive Business: Create and Maintain Valuable Customer Connections

Use Blogging to Supercharge Sales, Customer Loyalty, Innovation, and Profits

 

Blogging can help you deepen customer loyalty, reach new customers, gain indispensable feedback, and drive more sales. This no-nonsense guide...

The Value of RFID: Benefits vs. Costs
The Value of RFID: Benefits vs. Costs

RFID technology presents a great potential for creating competitive advantage. By automating and simplifying data collection, it lets users more accurately track assets and monitor key indicators, which in turn gives greater visibility to the operations. However, the benefits received from this technology will be determined by how well it is...

CISSP All-in-One Exam Guide, Second Edition
CISSP All-in-One Exam Guide, Second Edition
This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP certification!

The Certified Information Systems Security Professional (CISSP) exam covers ten domains, each of which may be considered a full field of study in itself, with many individual books and papers
...
unlimited object storage image
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy