|
|
Macromedia Studio MX 2004 BibleIf Macromedia Studio MX 2004 can do it, you can do it too…
Macromedia Studio MX 2004 offers a revolutionary set of integrated tools for Web developers. This book gives you control of its power. You’ll benefit from the expertise of volunteers, beta testers, and advisory board members who share the inside track on Dreamweaver... | | Competitive Intelligence: A Guide for Your Journey to Best-practice ProcessesAs one of the titles in APQC’s Passport to Success series, this book provides readers with a comprehensive understanding of what it takes to have a successful competitive intelligence functional unit. Based on years of research of leading-edge organizations—and supported by examples of best practices and tips from actual... | | How to Become a Highly Paid Corporate ProgrammerIt’s simple. To make it to the top of the pay scale, you must make yourself invaluable to your employer. Unfortunately, most programmers or aspiring programmers lack that critical “it” factor, the savvy that makes employers and clients stand up and take notice. This book will show you how to stand out from the pack, how to... |
|
Introduction to Extensible HTML (xHTML)This introductory book describes what is xHTML Basic, when to use it, and why it is important to learn. You will discover how the xHTML Basic language was developed and they types of applications that benefit from xHTML Basic programs.
The basic programming structure of xHTML Basic is describes along with the basic commands including... | | Windows Server HacksThe tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT,... | | Network Security AssessmentNetwork Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by... |
|
Access Cookbook, 2nd Edition
Access power users and programmers at all levels will rely on the Access Cookbook, Second Edition for quick solutions to gnarly problems. Fully updated for Access 2003, it's also one of the first books to thoroughly explore new support for .NET managed code and XML. All of the examples have been tested for... | | Quick Course in Microsoft Publisher 2002: Fast-Track Training Books for Busy PeopleLearn how to use Microsoft Publisher 2000 to create postcards, flyers, brochures, and newsletters, as well as how to work with frames, graphics, and templates, and how to prepare publications for printing for the web.
After a brief introduction to the software, users jump right in and create a postcard, flyer, brochure, and a newsletter.... | | Computers and Writing: The Cyborg EraIn the mid 1960s, when a single chip contained an average of 50 transistors, Gordon Moore observed that integrated circuits were doubling in complexity every year. In an influential article published by Electronics Magazine in 1965, Moore predicted that this trend would continue for the next 10 years. Despite being criticized... |
|
Decision Analysis for Management JudgmentIn an increasingly complex world, decision analysis has a major role to play in helping decision makers to gain a greater understanding of the problems they face. The main aim of this book is to make decision analysis accessible to its largest group of potential users: managers and administrators in business and public sector... | | Voice over 802.11 (Artech House Telecommunications Library)An understanding of the public switched telephone network (PSTN) and how it is potentially going to be replaced is best grasped by understanding its three major components: access, switching, and transport. Access pertains to how a user accesses the network. Switching refers to how a call is “switched” or routed ... | | The Visual Basic .NET Programming Language (Microsoft Net Development Series)If you want to leverage all of VB .NET’s immense power, get this book. It’s the definitive VB .NET reference and tutorial, and the first Visual Basic book written by one of VB .NET’s lead architects. No other book offers this much behind-the-scenes insight about why VB .NET works the way it does, how it evolved, and how you can... |
|
Result Page: Previous 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Next |