|
|
|
|
Essential SourceSafeThis training aid and reference manual assists casual users, software developers, and SourceSafe administrators in installing, configuring, and maintaining SourceSafe in a variety of development environments. A broad spectrum of topics are covered, from the basics of installation and maintenance, to more advanced features such as reporting, to ... | | Linux Security: Craig Hunt Linux LibraryAuthoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators
This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the... | | Build Your Own Home Office Furniture (Popular Woodworking)
Setting up a home office involves time, money and careful planning. For the creative woodworker, it can also mean the satisfaction of building each piece yourself. With designs ranging from weekend projects to a fully-realized computer desk, all of the plans in this book are fresh, functional and fun to build, including a stand-up desk... |
|
Reporting Technical Information
The leading text in technical writing, Reporting Technical Information introduces students to all aspects of technical communication, including letters, proposals and progress reports, recommendation reports, research reports, instructions, and oral reports. Continuing the esteemed tradition of its predecessors, the tenth edition... | | Operative Treatment of Elbow Injuries
Operative Treatment of Elbow Injuries is a complete presentation of all surgical approaches to repair of the elbow, demonstrating the most effective management of elbow injuries and problems. Drs. Plancher and Baker have assembled a group of well-known experts to write on the various procedures. Each contributor for each chapter discusses... | | Getting Started in Project ManagementSo you’re new to project management. Well, you’re not alone. Lots of people are discovering that project management is a tool that can help make their projects more successful. You’ve probably been doing projects for a long time: projects at work—such as developing a new product, improving a process,... |
|
|
Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... | | Digital Texturing & PaintingIf you work in 3D, you must have this book. More than a compendium of techniques for the texture professional, (digital) Texturing & Painting gets to the heart of being an artist in the digital realm. With this inspired guide, you'll learn to translate the enviroments you experience into an expressive, complete digital style:
... | | Core J2ME TechnologyThe J2ME platform is designed for devices with limited memory, display, and processing power including cellular phones, PDAs, and pagers. Core J2ME Technology & MIDP covers everything you need to develop powerful applications for this rapidly expanding wireless market.
Part I starts with an overview of J2ME, configurations, and... |
|
|
Result Page: Previous 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Next |