 |
|
|
 Special Edition Using Microsoft Office Word 2003More than any other, this book offers systematic, real-world guidance for experienced Word users, based upon the types of print and electronic documents you actually create, and the productivity challenges you actually face. It goes far beyond the basics, offering hundreds of advanced tips and techniques for maximizing productivity, automating... |  |  Silicon Germanium: Technology, Modeling, and DesignFilled with in-depth insights and expert advice, Silicon Germanium covers all the key aspects of this technology and its applications. Beginning with a brief introduction to and historical perspective of IBM’s SiGe technology, this comprehensive guide quickly moves on to:
- Detail many of IBM’s SiGe technology development
... |  |  Professional Event Coordination (The Wiley Event Management Series)Introducing a clear path toward event excellence
A comprehensive guide to essential competencies for event coordinators
Professional Event Coordination examines the full event planning process and provides the tools and strategies to effectively procure, organize, implement, and monitor all the products, services, and... |
|
 Enterprise Java Development on a Budget: Leveraging Java Open Source Technologies
TODAY THE JAVA 2 PLATFORM, Enterprise Edition (J2EE) is the most complete and effective platform for enterprise development. J2EE unifies and embodies the knowledge gained from building up-to-date, multitier applications, and provides this knowledge as a standardized set of modular components and services. We believe that J2EE simplifies many... |  |  |  |  How to Do Everything with Adobe Illustrator CSCreate illustrations, maps, logos, CD covers, animation objects, fine art, and more with help from this full-color guide. Illustrator expert David Karlins’ clear, step-by-step instruction will help you quickly grasp—and easily master—the fundamental and advanced features of this vector graphics tool. You’ll also learn... |
|
 Invasion of Privacy! Big Brother and the Company HackersPop-up ads, cookies, spyware, spam, junk mail, telemarketing calls. Rapidly evolving technology has made you a target and your personal information a desirable commodity. Your profile is out there and it’s available not just to the highest bidder, but to every bidder. Technology, advertising, the media, and government have converged to... |  |  |  |  Real World Software Configuration Management
Designed for use Visual Studio .NET/6.0, Visual SourceSafe 6.0c, and CVS 1.11, Real World Software Configuration Management provides an extensive overview on software configuration and development, accompanied by numerous real-world examples with lots of working code. While other books may spend a lot of time on software configuration... |
|
Result Page: Previous 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 Next |