Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using MIS (4th Edition)
Using MIS (4th Edition)

An engaging introduction to how people use IS to solve business problems.

 

Using MIS explains why MIS is the most important course in the business school by showing readers how businesses use information systems and technology to accomplish their...

Deficit: Why Should I Care?
Deficit: Why Should I Care?

At the turn of this century, the American national debt stood at just under $6 trillion and the deficit at a "mere" $86 billion. Today, the national debt has topped $14 trillion, and the yearly deficit for 2011 is projected at a whopping $1.4 trillion.

According to the U.S. Treasury Department's Annual...

Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion—or also simply called OS X Lion—is the latest version of the computer operating system that put the phrase graphic user interface in everyone’s vocabulary. With Mac OS, you can point, click, and drag to work with files, applications, and utilities. Because the same intuitive interface...
Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Computer Games as Educational and Management Tools: Uses and Approaches
Computer Games as Educational and Management Tools: Uses and Approaches

Though once considered purely for their entertainment value, computer and online games have applications as learning tools in learning in a variety of different environments.

Computer Games as Educational and Management Tools: Uses and Approaches considers the many uses of games and simulations, focusing specifically on...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)

The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....

pfSense 2 Cookbook
pfSense 2 Cookbook

pfSense is an open source distribution of FreeBSD-based firewall which provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options which, compared to other offerings, makes determining requirements a little more difficult and a lot more important....

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)
Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)

Smashing WordPress Themes is all about making your WordPress site look beautiful. But, the beautiful part is a very personal thing, because we all have different preferences. So in essence, my book isn’t on Web design, but rather about giving you, dear reader, the tools to build the kind of site that you want to create, using WordPress...

Fundamentals of Database Management Systems
Fundamentals of Database Management Systems
A course in database management has become well established as a required course in both undergraduate and graduate management information systems degree programs. This is as it should be, considering the central position of the database field in the information systems environment. Indeed, a solid understanding of the...
Result Page: Previous 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy