Home | Amazing | Today | Tags | Publishers | Years | Search 
Picture Yourself Learning Microsoft Word 2010
Picture Yourself Learning Microsoft Word 2010

Welcome to the world of Microsoft Word 2010. This new Picture Yourself book from Cengage Learning will help you use the many and varied features of one of Microsoft’s most popular products—Microsoft Word, part of the Microsoft Office Suite. Microsoft Word 2010 is a powerful word processing program that will take your...

Adobe Photoshop Elements 9: Maximum Performance: Unleash the hidden performance of Elements
Adobe Photoshop Elements 9: Maximum Performance: Unleash the hidden performance of Elements

Let Mark Galer guide you through the most powerful photo editing tools and techniques that Elements has to offer! A unique cominbtion of step-by-step projects, movie tutorials and sample images will have you creating stunning images in no time at all. Whether you want to enhance your images for maximum...

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...

Designed for Use: Create Usable Interfaces for Applications and the Web
Designed for Use: Create Usable Interfaces for Applications and the Web

In this book for designers, developers, and product managers, expert developer and user interface designer Lukas Mathis explains how to make usability the cornerstone of every point in your design process, walking you through the necessary steps to plan the design for an application or website, test it, and get usage data after the...

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

I suppose there are several questions that may be running through your head as you contemplate reading this book: Who is the intended audience for this book? How is this book different from book ‘x’ (insert your favorite title here)? Why should I buy it? Because these are all fair questions and I am asking you to plunk...

Introducing Microsoft WebMatrix
Introducing Microsoft WebMatrix

Your first look at the easy-to-use tools for building your own data-driven website

Get a running start with Microsoft WebMatrix—the free, downloadable web development solution featuring all the tools you need for server-side programming. This practical book introduces the templates, helper libraries, and...

Beginning C# Object-Oriented Programming
Beginning C# Object-Oriented Programming

It has been my experience as a .Net trainer and lead programmer that most people do not have trouble picking up the syntax of the language. What perplexes and frustrates many people are the higher-level concepts of object-oriented programming methodology and design. To compound the problem, most introductory programming books and...

Creating Games with Unity and Maya: How to Develop Fun and Marketable 3D Games
Creating Games with Unity and Maya: How to Develop Fun and Marketable 3D Games

The Unity Game Engine has been shaking things up. The engine is only a little over five years old now and in 2010 they have earned Develop Magazine's Grand Prix Award and surpassed 170,000 developers. The user base of consuming Unity products has grown dynamically as well. There are over 30 million total Unity Web Player...

Knowledge Management and E-Learning
Knowledge Management and E-Learning

This work embraces two heretofore distinct fields of study, knowledge management and e-learning. In order to understand the impetus to link these two fields by a common thread, it is necessary to understand the two fields and the focus of each.

Knowledge management (KM) has developed as a field from its roots in data and...

Social Location Marketing: Outshining Your Competitors on Foursquare, Gowalla, Yelp & Other Location Sharing Sites
Social Location Marketing: Outshining Your Competitors on Foursquare, Gowalla, Yelp & Other Location Sharing Sites

Social Location Marketing

 

Breakthrough social location marketing techniques for promoting your service, product, or venue!

 

Social Location Marketing offers...

Advanced Crime Scene Photography
Advanced Crime Scene Photography

Advanced Crime Scene Photography developed over time and out of my experiences as a crime scene investigator with a large metropolitan police department. Like any major city, violent crime is prevalent, offering numerous opportunities to utilize the different skills and techniques learned and evolved through numerous schools, scene...

The Google Resume: How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company
The Google Resume: How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company

Just so you’re clear: it was not my idea to give a talk to Microsoft Research. I had learned embarrassingly little about computer science in my 18 years of life, and the last thing I wanted to do is to have that exposed in front of a bunch of genius PhDs in MSR. But my manager thought it’d be a great...

Result Page: 884 883 882 881 880 879 878 877 876 875 874 873 872 871 870 869 868 867 866 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy