 |
|
 |  |  Deploying and Administering Windows Vista BibleAlthough analysts expect the majority of enterprises to tread slowly into migration, there certainly will be early adopters, as there are with any system or device. Because Microsoft has announced that it will support Windows 2000 only until the year 2010, enterprises using older versions of Windows will not have much time for leisurely testing and... |  |  Designing Effective Web SurveysDesigning Effective Web Surveys is a practical guide to designing Web surveys, based on empirical evidence and grounded in scientific research and theory. It is designed to guide survey practitioners in the art and science of developing and deploying successful Web surveys. It is not intended as a "cook book"; rather it is meant to get... |
|
 User Interface Design: A Software Engineering PerspectiveWhen you design the user interface to a computer system, you decide which screens the system will show, what exactly will be in each screen and how it will look. You also decide what the user can click on and what happens when he does so, plus all the other details of the user interface. It is the designer’s responsibility that the system has... |  |  Learning Theory: 20th Annual Conference on Learning Theory, COLT 2007, San Diego, CA, USA, June 13-15, 2007This book constitutes the refereed proceedings of the 20th Annual Conference on Learning Theory, COLT 2007, held in San Diego, CA, USA in June 2007.
The 41 revised full papers presented together with 5 articles on open problems and 2 invited lectures were carefully reviewed and selected from a total of 92 submissions. The papers cover a wide... |  |  Wireless Security: Know It AllThe latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and... |
|
 Build Your Own Security Lab: A Field Guide for Network TestingWelcome to Build Your Own Security Lab. With this book, you can increase your hands-on IT security skills. The techniques and tools discussed in this book can benefit IT security designers and implementers. IT security designers will benefit as they learn more about specific tools and their capabilities. Implementers will gain firsthand experience... |  |  BusinessObjects XI Release 2 For Dummies (Computer/Tech)Make better decisions with help from BusinessObjects
Find your way around Universes and see how your organization is doing
BusinessObjects may seem like a dauntingly complex topic, but this book makes it a snap. Even if you're new to business intelligence tools, you'll find it's... |  |  The Robosapien Companion: Tips, Tricks, and Hacks (Technology in Action)You'll lovenThe Robosapien Companion: Tips, Tricks, and Hacks whether you're a robotics expert or beginner. And whether you own a Robosapien or not, or are anticipating the V2 release, you'll learn about the workings and theory of this fun robot. An owner of several Robosapiens himself, author Jamie Samans covers everything from basics like... |
|
 The Best Damn Windows Server 2008 Book Period, Second EditionIn depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.
The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to... |  |  |  |  |
|
| Result Page: 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 |