Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Access 2010 VBA Macro Programming
Microsoft Access 2010 VBA Macro Programming

Database macro programming has changed enormously over the last 15 years, having gone from Access Basic macros to VBA. Another major change occurred with Office 95, when macros went to VBA modules in a separate environment accessed via the Visual Basic Editor. It used to be fairly basic: code was entered into a special design window....

From Bash to Z Shell: Conquering the Command Line
From Bash to Z Shell: Conquering the Command Line

A shell is a sophisticated way to control your computer—Unix, Linux, Microsoft Windows, Mac OS X, and others. If you do more than the most basic operations, you can do many of them more powerfully and quickly with a shell and your keyboard than by using a mouse.

The history of shells goes back some 30 years. In the early...

Research and Trends in Data Mining Technologies and Applications
Research and Trends in Data Mining Technologies and Applications
In enterprises, a large volume of data has been collected and stored in data warehouses. Advances in data gathering, storage, and distribution have created a need for integrating data warehousing and data mining techniques. Mining data warehouses raises unique issues and requires special attention. Data warehousing and data mining are...
Core HTML5 Canvas: Graphics, Animation, and Game Development (Core Series)
Core HTML5 Canvas: Graphics, Animation, and Game Development (Core Series)
In the summer of 2001, after 15 years of developing graphical user interfaces and graphics-intensive applications, I read a best-selling book about implementing web applications by someone I did not know—Jason Hunter—but whom, unbeknownst to me, would soon become a good friend on the No Fluff Just Stuff (NFJS) tour....
SAP R/3 for Everyone: Step-by-Step Instructions, Practical Advice, and Other Tips and Tricks for Working with SAP
SAP R/3 for Everyone: Step-by-Step Instructions, Practical Advice, and Other Tips and Tricks for Working with SAP

SAP R/3 for Everyone is the nontechnical user's guide to working with SAP R/3, the leading business enterprise software product in the world. Written and road-tested by experienced SAP R/3 users and trainers, this book saves typical SAP R/3 users time and trouble by providing them with the universal skills needed to...

C# Multithreaded and Parallel Programming
C# Multithreaded and Parallel Programming

Develop powerful C# applications to take advantage of today's multicore hardware

About This Book

  • Make use of the latest Visual Studio debugging tools, to manage and debug multiple threads running simultaneously
  • Learn how to use the Thread, Task, and Parallel libraries in your C#...
Black & Decker The Book of Home Improvement: The Most Popular Remodeling Projects Shown in Full Detail
Black & Decker The Book of Home Improvement: The Most Popular Remodeling Projects Shown in Full Detail
This comprehensive guide to home improvement includes the top 100 home improvement projects, all in full, step-by-step instruction, and all from the trusted experts at BLACK+DECKER.

Boasting 560 pages of hardworking, how-to instructions and photos, this is quite possibly the only home remodeling you, or any
...
Fedora 11 and Red Hat Enterprise Linux Bible
Fedora 11 and Red Hat Enterprise Linux Bible
The leading Fedora book-over a quarter of a million copies sold of previous editions!

What better way to learn Fedora 11 than with the leading Fedora book from the best-selling Linux author, Christopher Negus with Eric Foster Johnson? Whether you're new to Linux or an advanced user, this power-packed guide is loaded with...

JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Result Page: 26 25 24 23 22 21 20 19 18 17 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy