Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Build Your Own Web Site The Right Way Using HTML & CSS
Build Your Own Web Site The Right Way Using HTML & CSS
Build Your Own Website The Right Way Using HTML & CSS, 2nd Edition teaches web development from scratch, without assuming any previous knowledge of HTML, CSS or web development techniques. This book introduces you to HTML and CSS as you follow along with the author, step-by-step, to build a fully functional web site from the ground up....
Schaum's Outline of Calculus, 5ed: Schaum's Outline of Calc, 5ed (Schaum's Outline Series)
Schaum's Outline of Calculus, 5ed: Schaum's Outline of Calc, 5ed (Schaum's Outline Series)

Confusing Textbooks? Missed Lectures? Not Enough Time?

Fortunately for you, there's Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline...

SAS/FSP 9.2 Procedures Guide
SAS/FSP 9.2 Procedures Guide

Provides complete descriptions of all statements, options, windows, and commands that can be used with SAS/FSP software's FSBROWSE, FSEDIT, FSLETTER, and FSVIEW procedures.

The procedures in SAS/FSP software provide convenient interactive facilities for data
entry, editing, and retrieval. Using SAS/FSP software you can

Word Origins
Word Origins
The average English speaker knows around 50,000 words. That represents an astonishing diversity – nearly 25 times more words than there are individual stars visible to the naked eye in the night sky. And even 50,000 seems insignificant beside the half a million recorded in the Oxford English Dictionary. But looked at from an...
The Orange Code: How ING Direct Succeeded by Being a Rebel with a Cause
The Orange Code: How ING Direct Succeeded by Being a Rebel with a Cause

How championing consumers led to ING Direct's revolutionary rise in the banking industry In an industry dominated by big banks with little patience for their customers, ING Direct has always strived to be different-a rebel with a cause, if you will-and in doing so, they've become the most successful online banking venture in history....

Handbook on Decision Support Systems 2: Variations (International Handbooks on Information Systems)
Handbook on Decision Support Systems 2: Variations (International Handbooks on Information Systems)

As the most comprehensive reference work dealing with decision support systems (DSS), this book is essential for the library of every DSS practitioner, researcher, and educator. Written by an international array of DSS luminaries, it contains more than 70 chapters that approach decision support systems from a wide variety of perspectives....

A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a renowned expert in the field, this book offers readers a succinct, reader-friendly foundation to the chief approaches, methods and techniques currently employed in the field of data compression.

Part I presents the basic...

Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other,...
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are...
AJAX Black Book
AJAX Black Book
This book, AJAX Black Book, discusses what Ajax is and what it means to Web developers, as well as the technologies behind Ajax applications. Working through this book, you'll discover how Ajax gives web developers the ability to build applications that are more interactive, more dynamic, more exciting and enjoyable for their users. This book shows...
Mac OS X Leopard QuickSteps
Mac OS X Leopard QuickSteps
Step-by-Step, Full-Color Graphics!

Get started using Mac OS X 10.5 Leopard right away--the QuickSteps way. Color screenshots and clear instructions show you how to use all the new and improved features available in...

Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
unlimited object storage image
Result Page: Previous 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy