Home | Amazing | Today | Tags | Publishers | Years | Search 
eBay Listings That Sell For Dummies (Computer/Tech)
eBay Listings That Sell For Dummies (Computer/Tech)

Discover the tricks top sellers use to grab attention

Create your own unique eBay selling pages with time-tested techniques

So you know your way around eBay, but you're not getting the highest bids for your items? Maybe your listings need a makeover! Here are all the...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Information Retrieval for Music and Motion
Information Retrieval for Music and Motion
A general scenario that has attracted a lot of attention for multimedia information retrieval is based on the query-by-example paradigm: retrieve all documents from a database containing parts or aspects similar to a given data fragment. However, multimedia objects, even though they are similar from a structural or semantic viewpoint, often reveal...
Computer Networks: A Systems Approach, 3rd Edition (The Morgan Kaufmann Series in Networking)
Computer Networks: A Systems Approach, 3rd Edition (The Morgan Kaufmann Series in Networking)
In this new edition of their classic and bestselling textbook, authors Larry Peterson and Bruce Davie continue to emphasize why networks work the way they do. Their "system approach" treats the network as a system composed of interrelated building blocks (as opposed to strict layers), giving students and professionals the best possible...
Teach Yourself VISUALLY Microsoft Word 2003
Teach Yourself VISUALLY Microsoft Word 2003

Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 125 Word 2003 tasks. Each task-based spread includes these great features to get...

Peer-to-Peer Computing: Building Supercomputers with Web Technologies (Computer Communications and Networks)
Peer-to-Peer Computing: Building Supercomputers with Web Technologies (Computer Communications and Networks)
Client/Server architecture was first proposed in the late 1980s as an alternative to conventional mainframe systems. Mainframe processing quickly becomes a bottleneck in any information system, but client/server models shift the processing burden to the client computer. Through workload sharing, client/server systems can improve overall efficiency...
Software Engineering 1: Abstraction and Modelling (Texts in Theoretical Computer Science. An EATCS Series)
Software Engineering 1: Abstraction and Modelling (Texts in Theoretical Computer Science. An EATCS Series)
From the reviews:

"The book under review is the first one from a series of three volumes that provides a compelling framework for a more comprehensive understanding of both formal and practical concerns of software engineering. The major feature distinguishing these textbooks from other current ones is the natural manner in which...

CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide is an excellent self-study resource for the 642-845 ONT exam. Passing the exam certifies that the successful candidate has important knowledge and skills in optimizing and providing effective QoS techniques for converged networks. Passing the exam is one of the requirements for the Cisco Certified Network...
Security Power Tools
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security...
eBay Timesaving Techniques for Dummies
eBay Timesaving Techniques for Dummies

Buy low, sell high, and do it all more efficiently!

Over 60 techniques that help you save time by…

  • Revealing sources, both on and off eBay, for cool merchandise you can resell
  • Choosing the right shipper without doing the research yourself
  • Sharing exclusive accounting software...
Model-Driven Architecture in Practice: A Software Production Environment Based on Conceptual Modeling
Model-Driven Architecture in Practice: A Software Production Environment Based on Conceptual Modeling
Formal specification languages, object-oriented methods, CASE tools, component-based software production, agent-oriented, aspect-oriented ... During the last two decades many techniques have been proposed from both research and industry in order to generate a correct software product from a higher-level system specification. Nevertheless, the many...
Introduction to Reconfigurable Computing: Architectures, algorithms and applications
Introduction to Reconfigurable Computing: Architectures, algorithms and applications
The book by Christophe Bobda, however, has also been written for people with a software background, substantially reducing the educational leap by bridging the gap. His book has the potential to become a best-seller and to stimulate the urgently needed transformation of the software developer populations mind set, by playing a similar role as known...
Result Page: 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy