Excel users. Access users. You're probably among the majority, living in one camp or the other but rarely crossing between the two. Yet Microsoft designed these applications to work together. In this book, you'll discover how Access benefits from Excel's flexible presentation layer and versatile analysis capabilities, while Access's relational...
Bioinformatics, Biocomputing and Perl presents an extended tutorial introduction to programming through Perl, the premier programming technology of the bioinformatics community. Even though no previous programming experience is assumed, completing the tutorial equips the reader with the ability to produce powerful custom...
When the first edition of About Face was published in 1995, the idea of designing products based on human goals was a revolutionary concept. Thanks to the work of Alan Cooper and other pioneers, interaction design is now widely recognized as a unique and vital discipline, but our work is far from finished.
Learn to Design High Performance Switches and Routers for Today's Ever Growing Internet Traffic
As Internet traffic continues to grow, and demands for quality of service become more stringent, researchers and engineers can turn to High Performance Switches and Routers for tested and proven solutions. This...
"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...
Wiley Series on Bioinformatics: Computational Techniques and Engineering
Discover how data mining is fueling new discoveries in bioinformatics
As the field of bioinformatics continues to flourish, producing enormous amounts of new data, the need for sophisticated methods of data mining to better manage and extract meaning from...
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.
Traditionally, security for mobile devices—which are essentially...
Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...
Praise for Auditor′s Guide to Information Systems Auditing
"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...
Software Testing presents one of the first comprehensive guides to testing activities, ranging from test planning through test completion for every phase of software under development, and software under revision. Real life case studies are provided to enhance understanding as well as a companion website with tools and examples....
This text demonstrates how to extract knowledge by finding meaningful connections among data spread throughout the Web. Readers learn methods and algorithms from the fields of information retrieval, machine learning, and data mining which, when combined, provide a solid...
Learn how to tap the full potential of Access 2007 Transfer Access data seamlessly between Microsoft Office applications—and that's just for starters. In this all-new, comprehensive guide by well-known Access expert Helen Feddema, you’ll learn to write Visual Basic code that automates Access database tasks, creates standalone...