Home | Amazing | Today | Tags | Publishers | Years | Search 
Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
A hands-on guide to testing techniques that deliver reliable software and systems

Testing even a simple system can quickly turn into a potentially infinite task. Faced with tight costs and schedules, testers need to have a toolkit of practical techniques combined with hands-on experience and the right strategies...

Computer Graphics for Java Programmers
Computer Graphics for Java Programmers

A great many varied and interesting visual effects can be achieved with computer graphics, for which a fundamental understanding of the underlying mathematical concepts – and a knowledge of how they can be implemented in a particular programming language – is essential.

Computer Graphics for Java Programmers, 2nd...

PowerPoint 2007 Bible
PowerPoint 2007 Bible

Creating a good presentation is much more than just clicking a few dialog boxes and typing some text. It requires knowledge and planning-lots of it. With the PowerPoint 2007 Bible you will not only be able to build a presentation with PowerPoint, but you’ll also be able to explain why you made the choices you did, and you’ll...

Office 2007 Bible
Office 2007 Bible
The leading Microsoft Office application experts together in one book!

Here's the best of the best on Office 2007

Microsoft designed Office 2007 to be used as a package. We designed this Bible as a package that combines the best from the Word, Excel, PowerPoint, Outlook, and Access Bibles with...

Ajax Bible
Ajax Bible

Build interactive Web applications with Ajax

Create live searches and online spreadsheets

Discover programming mistakes to avoid!

Create blazing-fast Web applications with powerful Ajax

If you think that mastering Ajax is too difficult, guess again. You can create Web applications that look and feel like desktop...

The Oracle Hacker's Handbook: Hacking and Defending Oracle
The Oracle Hacker's Handbook: Hacking and Defending Oracle

Knowledge is power, and the power can be yours

While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you...

PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
When you want to defend Windows Vista,it's good to know a PC Magazine expert

Unless a time machine just dropped you in the 21st century, you already know that protecting your computer is essential. Now, here's Vista—new enough that no one is sure exactly what security threats might arise to hijack your...

Windows Vista Security: Securing Vista Against Malicious Attacks
Windows Vista Security: Securing Vista Against Malicious Attacks

It's not the computer. The hacker's first target is YOU!

A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and...

Hacking Windows Vista: ExtremeTech
Hacking Windows Vista: ExtremeTech

"Why didn't they ask me before they did that?"

Vista is the most radical revamping of Windows since 1995. But along with all the fantastic improvements, there are a couple of things that drive you up the wall. Maybe you're not seeing the performance you expect. Security is better, but boy, is it annoying. And what's with...

Google Power Tools Bible
Google Power Tools Bible

The most thorough and comprehensive guide to Google

Expand your world with the dozens of Google tools, applications, and services you'll find in this comprehensive book. Going well beyond the basics of search, this in-depth resource shows you how to access and apply every one of Google's features-things like Gmail, Google Maps, and...

Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World

An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment

No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...

Handbook of Virtual Humans
Handbook of Virtual Humans
Virtual Humans simulations are becoming increasingly popular and many systems are now available to animate Virtual Humans. Such systems encompass several different domains including autonomous agents in virtual environments, human factors analysis, training, education, virtual prototyping, simulation–based design and entertainment.

At...

Result Page: 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy