Home | Amazing | Today | Tags | Publishers | Years | Search 
LinkedIn For Dummies
LinkedIn For Dummies

Relationships matter. Ever since the dawn of time, when caveman Fred asked caveman Barney whether there was any work down at the quarry, human beings have always networked. We’re social creatures who like to reach out and talk to someone. As the Internet developed and grew in popularity, people rapidly took advantage of this new...

Numerical Methods, Algorithms and Tools in C#
Numerical Methods, Algorithms and Tools in C#

Today, more than at any other time in the history of mankind, computers are increasingly and successfully being exploited to gain a better understanding of our physical world and as a result, also deepen our appreciation and reverence for God’s Creation. Consequently, as computers evolve, so must the means to control them through...

Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

VCP4 Exam Cram: VMware Certified Professional (2nd Edition)
VCP4 Exam Cram: VMware Certified Professional (2nd Edition)

Virtualization is one of the hottest topics in the tech industry today. The leader in the virtualization space at the present time is without a doubt VMware with its virtual infrastructure offering. As VMware software began to take its place in the data center and demand respect in the industry, the need for a...

Internet Information Services Administration
Internet Information Services Administration

Over the last few years, I've found an abundance of books that answer the question, "What can I do when administering Internet Information Server?" But I have yet to find a book that answers the more pertinent question: "What should I do when administering Internet Information Services?" This is the...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

R Cookbook (O'Reilly Cookbooks)
R Cookbook (O'Reilly Cookbooks)

R is a powerful tool for statistics, graphics, and statistical programming. It is used by tens of thousands of people daily to perform serious statistical analyses. It is a free, open source system whose implementation is the collective accomplishment of many intelligent, hard-working people. There are more than 2,000 available add-ons, and R...

Programming Applications for Microsoft Office Outlook 2007
Programming Applications for Microsoft Office Outlook 2007

Microsoft Office Outlook 2007 offers compelling new product features including Instant Search, task flagging, the To-Do Bar, Calendar overlays, sharing with friends and coworkers, Really Simple Syndication (RSS) feeds, Electronic Business Cards, Microsoft Office SharePoint Server integration, and plenty of other features that make Outlook...

Working with Microsoft Dynamics CRM 2011
Working with Microsoft Dynamics CRM 2011

We love Microsoft Dynamics CRM 2011, and we hope that by the time you finish reading this book, you will love Microsoft Dynamics CRM, too. We understand that you might be skeptical about the possibility of falling for a piece of software, but we want you to know right up front that our goal is to show you all of the wonderful and...

Fundamental Concepts in Computer Science (Advances in Computer Science and Engineering: Texts)
Fundamental Concepts in Computer Science (Advances in Computer Science and Engineering: Texts)

Computer Science, or Informatics as it is often called in Europe, is viewed by many as being both a science and a technology. Clearly, its technological aspects are very much upon us on a day to day basis. Yet all other exact  sciences such as physics, biology or chemistry are also very present in ourdaily lives through the technologies...

Writing mental ray® Shaders: A Perceptual Introduction (mental ray® Handbooks)
Writing mental ray® Shaders: A Perceptual Introduction (mental ray® Handbooks)

The word "render" isn't unique to the vocabulary of computer graphics. We can talk about a "watercolor rendering," a "musical rendering" or a "poetic rendering." In each of these, there is a transformation from one domain to another: from the landscape before the painter to color on paper, from...

Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

Result Page: 1225 1224 1223 1222 1221 1220 1219 1218 1217 1216 1215 1214 1213 1212 1211 1210 1209 1208 1207 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy