Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning SQL on SQL Server 2005
Learning SQL on SQL Server 2005

Anyone who interacts with today's modern databases needs to know SQL (Structured Query Language), the standard language for generating, manipulating, and retrieving database information. In recent years, the dramatic rise in the popularity of relational databases and multi-user databases has fueled a healthy demand for...

Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Automated Data Analysis Using Excel
Automated Data Analysis Using Excel
Because the analysis of copious amounts of data and the preparation of custom reports often take away time from true research, the automation of these processes is paramount to ensure productivity. Exploring the core areas of automation, report generation, data acquisition, and data analysis, Automated Data Analysis Using Excel illustrates how to...
A Guide to MATLAB Object-Oriented Programming
A Guide to MATLAB Object-Oriented Programming
I am an admitted object-oriented fanatic. I have been designing and implementing object-oriented software for more than twenty years. When I started designing and implementing object-oriented MATLAB®, I encountered many detractors. They would say things like “The object model isn’t complete,” “You can’t have public...
Affect and Emotion in Human-Computer Interaction: From Theory to Applications (Lecture Notes in Computer Science)
Affect and Emotion in Human-Computer Interaction: From Theory to Applications (Lecture Notes in Computer Science)
Affect and emotion play an important role in our everyday lives: They are present whatever we do, wherever we are, and wherever we go, without us being aware of them for much of the time. When it comes to interaction, be it with humans, technology, or humans via technology, we suddenly become more aware of emotion, either by seeing the...
Ubiquitous Computing Fundamentals
Ubiquitous Computing Fundamentals

a must-read text that provides a historical lens to see how ubicomp has matured into a multidisciplinary endeavor. It will be an essential reference to researchers and those who want to learn more about this evolving field.

-From the Foreword, Professor Gregory D. Abowd, Georgia Institute of Technology

...
My iPhone (covers 3G, 3Gs and 4 running iOS4) (4th Edition)
My iPhone (covers 3G, 3Gs and 4 running iOS4) (4th Edition)

Step-by-step instructions with callouts to iPhone images that show you exactly what to do.

 

Help when you run into iPhone problems or limitations.

 

Tips and Notes...

Hardboiled Web Design
Hardboiled Web Design

Every web designer harbours tales of frustration, limitation and despair. Web design requires skills and knowledge beyond mere manipulation of form, shape, language, colour, message and meaning. What users don’t see behind those visuals is just as important as what they do see. We have to think about moving parts and engineering...

Teach Yourself VISUALLY Word 2010
Teach Yourself VISUALLY Word 2010

Learn to use Microsoft Word 2010 the easy, visual way

Word is the most popular application in the Microsoft Office suite, and Word 2010 has some exciting new features. If you learn best when you can see how something is done, you'll find the step-by-step instructions and full-color screen shots make it quick and easy to learn...

ASP.NET jQuery Cookbook
ASP.NET jQuery Cookbook

The jQuery library has become increasingly popular with web application developers because of its simplicity and ease of use. The library is supported by an active community of developers and has grown significantly over the years after its inception in 2006 by John Resig. Using this library eases complicated tasks and adds to the interactive...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

unlimited object storage image
Result Page: 445 444 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy