 |
|
 The Selfish Meme : A Critical Reassessment'Distin's discussion is even-handed and informative for those wishing to update themselves on the current state of play in the field.' Scientific and Medical Network Review 'A model of clarity, the book's appeal is wide - from philosophers to sociologists, anyone interested in how cultures change will benefit from reading The Selfish Meme. Her... |  |  Microsoft CRM 3 For Dummies (Computer/Tech)This book is about Microsoft Dynamics CRM Version 3.0, which we refer to as simply Microsoft CRM or just CRM. We assume that Microsoft CRM just showed up on your desktop computer or notebook. Chances are, you already have some experience with one or more of the popular predecessors to CRM — ACT, GoldMine, SalesLogix, or an... |  |  |
|
 Sams Teach Yourself Red Hat Linux Fedora in 24 HoursAn easy-to-understand, step-by-step guide and starter kit to help beginners install, configure, and use the latest version of Linux. Updated to cover the latest major release of Red Hat Linux, expected fall, 2003. Red Hat Linux is the most popular choice among Linux users in the U.S., with about 85% of the U.S. Linux market. Assumes no prior... |  |  Web Design For Dummies (Computer/Tech)Build your own eye-popping site design
Create a user-friendly site, design great graphics, and make updating easy
It can take a flock of folks to build, design, and maintain an out-of-sight Web site. Whether you're designing a site on your own or are a member of a design team,... |  |  Wireless Technology: Protocols, Standards, and TechniquesWe can always wait a bit longer to write a better book on technology.We can always wait . . .
In this ever-changing technological scenario, keeping pace with the rapid evolution of wireless technology is a formidable, exciting, and indispensable task more than a challenge. The work is indeed herculean and often... |
|
 Cyber Terrorism: Political And Economic ImplicationsCyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed... |  |  |  |  Pro Service-Oriented Smart Clients with .NET 2.0This book shows you how to build smart client applications and how to exploit them using a service-oriented architecture. So, the best way to introduce the book is to define just what a smart client is.
A smart client is not a technology. Rather, a smart client is a concept for a client application with specific features.... |
|
|
Result Page: 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 |