|
|
Professional SharePoint 2010 Branding and User Interface Design
A must have guide for creating engaging and usable SharePoint 2010 branding
With SharePoint 2010, Microsoft has provided a more robust environment for creating collaboration and content management sites that rival any of the popular websites on the internet. Creating a branded SharePoint site involves understanding both... | | Photoshop Elements 9 All-in-One For Dummies
Photoshop Elements has evolved over several generations to become a sophisticated photo editor. What was once a low-end, consumer-grade product is now a tool for novice photo editors, amateur photographers, and professionals alike.
Elements shines on its own turf and is distinguished from Adobe Photoshop in many ways. Not only a... | | iPod touch For Dummies
This is the part in which I’m supposed to introduce the iPod touch and tell you why I wrote this book, but frankly, I’m so blown away by the iPod touch and all it can do that all I want to do is get you started with it.
Yes, I have a history with iPods: I wrote iPod & iTunes For Dummies, which I recommend for... |
|
|
Dad's Guide to Pregnancy For Dummies (For Dummies (Health & Fitness))
Practical, hands-on information for fathers-to-be
When it comes to pregnancy, dads' roles have changed so much in the past few decades that expectant fathers don't always know where to turn to for guidance and advice on this milestone event. Now they do!
Dad's Guide to Pregnancy For Dummies is... | | High Performance Computing on Vector Systems 2010
This book covers the results of the 11th and 12th Teraflop Workshop and continued a series initiated by NEC and the HLRS in 2004. As part of the TeraflopWorkbench, it has become a meeting platform for scientists, application developers, international experts and hardware designers to discuss the current state and future directions of... | | E-Mail Security: A Pocket Guide
E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,... |
|
|
Result Page: Previous 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 Next |