|
|
|
|
|
Essential Blogging : Selecting and Using Weblog ToolsWith weblogs-or "blogs"-exploding all over the Web, the only thing lacking for power users and developers is detailed advice on how choose, install, and run blogging software. Written by leading bloggers, Essential Blogging includes practical advice and insider tips on the features,... | | Sams Teach Yourself Adobe Premiere 6.5 in 24 HoursSams Teach Yourself Adobe Premiere in 24 Hours offers practical advice from an author with a strong writing background, solid teaching experience, and extensive television production credentials.
Rather than simply presenting a collection of disconnected lessons, Sams Teach Yourself Adobe Premiere in 24 Hours always reminds its readers... | | Hotel Front Office ManagementThe third edition of Hotel Front Office Management continues to address the demands of the hotel industry in the new millennium. Educators who are preparing professionals for roles as front office managers and general managers in hotels are required to meet the challenges of operations, technology, training, empowerment, and... |
|
Mastering ASP.NET with VB.NETTake Web Application Programming to a Whole New Level Microsoft's .NET Framework means enormous changes for Web programming. Using Visual Studio's ASP.NET and VB.NET, and a host of established and up-and-coming Internet technologies, you can build cleaner, more powerful Web applications, and you can do it more quickly than ever... | | Database Administration: The Complete Guide to Practices and Procedures"One of Craig's hallmarks is his ability to write in a clear, easy-to-read fashion. The main purpose of any technical book is to transfer information from writer to reader, and Craig has done an excellent job. He wants the reader to learn—and it shows." —Chris Foot, Senior Oracle Certified Instructor,... | | Wireless Security Essentials: Defending Mobile Systems from Data PiracyProtect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,... |
|
|
|
Result Page: Previous 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 Next |