Microsoft Access 2010 VBA Macro Programming
Database macro programming has changed enormously over the last 15 years,
having gone from Access Basic macros to VBA. Another major change occurred
with Office 95, when macros went to VBA modules in a separate environment
accessed via the Visual Basic Editor. It used to be fairly basic: code was entered into a special
Parallel Programming: for Multicore and Cluster Systems
Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be...
Perceptual Computing: Aiding People in Making Subjective Judgments
Explains for the first time how "computing with words" can aidin making subjective judgments
Lotfi Zadeh, the father of fuzzy logic, coined the phrase"computing with words" (CWW) to describe a methodology in which theobjects of computation are words and propositions drawn from anatural language....
Outsider Art: From the Margins to the Marketplace
The term outsider art has been used to describe work produced exterior to the mainstream of modern art by certain self-taught visionaries, spiritualists, eccentrics, recluses, psychiatric patients, criminals, and others beyond the perceived margins of society. Yet the idea of such a raw, untaught creativity remains a...
Windows Server 2008 R2 Remote Desktop Services Resource Kit
In-depth and comprehensive, this official Microsoft RESOURCE KIT delivers the information you need to plan, deploy, and administer Remote Desktop Services in Windows Server 2008 R2. You get authoritative technical guidance from those who know the technology best-leading industry experts and members of the Microsoft Desktop Virtualization...
Cryptography Engineering: Design Principles and Practical Applications
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...
Introduction to Evolutionary Algorithms (Decision Engineering)
Evolutionary algorithms are becoming increasingly attractive across various disciplines, such as operations research, computer science, industrial engineering, electrical engineering, social science and economics. Introduction to Evolutionary Algorithms presents an insightful, comprehensive, and up-to-date treatment of evolutionary algorithms.... Microsoft Visual Studio 2010 Unleashed
This end-to-end deep dive into Microsoft Visual Studio 2010 Professional will help working developers squeeze maximum productivity out of Visual Studio 2010’s extraordinarily rich toolbox, whether they are writing code for the Web, Windows, Silverlight, or Microsoft’s Azure cloud computing environment.
Governing Climate Change (Global Institutions)
Governing Climate Change provides a short and accessible introduction to how climate change is governed by an increasingly diverse range of actors, from civil society and market actors to multilateral development banks, donors and cities.
The issue of global climate change has risen to the top of the international...
|Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next |