Place Your Order Before November 30th To Get Your Books In Time For The Holidays!
Shopping cart imageShopping Cart (0) Items

Computing & Internet

Page: 1 of 3 << < 1 2 3 > >>

A Wilderness of Forking Paths Tony Arnold
Books with a 4 star rating(2)
$25.00
Size: 6" x 9"
Binding: Perfect Bound
"A Wilderness of Forking Paths" is the antipodal companion to the previous Whisanant Mythos volume, "A Wild Hunt." Absent a moral/philosophical wilderness guide such as "A Wild Hunt," "...Forking Paths" illustrates the tragic potential lying in wait for each of us in the form of traps along life's wandering pathways. Utilizing Artificial Intelligence images extracted from a parallel reality regarding our subject's twin doppelganger there, this book uses the Temple of Scientonomy's computer network to translate those images into a storyline depicting an altogether different outcome for the parallel Dixie Whiz! Printed on glossy stock, featuring over 75 original full-color plates. Volu ...
An Introduction to Windows 8 Dennis Adonis
Books with a 0 star rating(0)
$25.00
Size: 8.5" x 11"
Binding: Perfect Bound
Batchography: The Art of Batch Files Programming Elias Bachaalany
Books with a 0 star rating(0)
$34.99
Size: 7.5" x 9.25"
Binding: Perfect Bound
Long gone are the days when you had to use search engines to jump from one website to another in order to figure out the syntax or how to solve a problem using a Batch file script. The Batchography book is a boon for system administrators, build engineers, programmers and home users alike. It takes you on a journey of re-discovery of the lost art of Batch files programming. Whether you are an experienced user or new to the language, you will be surprised by the clarity and the abundance of the material presented in this book. With more than 140 scripting recipes, you will learn about things that you never thought were possible to achieve using the Batch files scripting language.
Computer v Communications Ana Aizcorbe
Books with a 0 star rating(0)
$54.78
Size: 8.5" x 11"
Binding: Perfect Bound
Since at least the mid-1980s, economists have toiled steadily at improving price indexes for high tech goods and services. The first fruits of this effort were seen in computers.1 The use of quality-adjusted price indexes (primarily hedonic price indexes) for computing equipment has now been institutionalized in the national income accounts of the United States and other industrialized nations, and has radically altered our understanding of the macroeconomics of growth and productivity improvement over the last two decades.
Computer Work Kerry Davies
Books with a 0 star rating(0)
$52.37
Size: 8.5" x 11"
Binding: Perfect Bound
Today, computer is no longer confined the laboratory. Computers and indeed, computing have become embedded in almost every item we use. Computing is fast becoming ubiquitous.
Controlling the Celestron Advanced GT Telescope Mount with Python Rodney Williamson
Books with a 0 star rating(0)
$29.95
Size: 6" x 9"
Binding: Perfect Bound
This book is for people who want to use their PC to control their Celestron Advanced Series GT telescope mount. I will say up front that my mount is several years old and uses RS-232 for communication instead of USB. However, the command protocol is the same and the Python code should mostly be the same also. I have used this code on both a Windows 10 and Windows 11 PC. I assume that the reader is familiar with the Python programming language. You don’t need to be an expert programmer—I’m not—but you do need to be sufficiently experienced with Python to read and understand the code examples. All the code examples in this book were written using Python 3.6. The GUI was developed ...
Creating an information traceability system in a semiconductor manufacturing environment Dissertation for Masters in Information Technology Northumbria University (2010 - 2013) Dr Ing Louis Montebello
Books with a 0 star rating(0)
$25.00
Size: 8.5" x 11"
Binding: Perfect Bound
The conclusion of this work showed that even though in the particular environment a reduction in throughput and efficiency of the manufacturing systems was detrementation and would bring about a cost effect, the quality aspect was so crucial that the implemenation was planned to continue, increasing the positions in the manufacturing stages whereby the quality check for traceability will be carried out. Another conclusion that could be clearly stated is that checks that are purely operator dependant should be eliminated or reduced drastically from manufacturing of high cost units due to the risk of mistake. All checks should be as fool-proof as possible to eliminate human errors ...
Cryptocurrency and The New Black Wall Street Xavier Odili
Books with a 0 star rating(0)
$29.99
Size: 5.5" x 8.5"
Binding: Perfect Bound
ISBN: 9781639015221
INTRODUCING MICHELLE LILLY, MSc, the first African American woman with a MASTERS DEGREE IN DIGITAL CURRENCY! Her years of training are now in your hands! Money. Everyone needs it, so we all work to get it. We spend, trade, earn, and save it. Unfortunately, our banking system is flawed. People know that banks offer minimal interest in return for borrowing your money, yet banks use these deposits to make significant profits. Banks also charge you fees to access your money, so you end up losing money just to watch your money collect dust in a weak interest-earning account. Imagine if you could increase your finances without having to perform manual labor - you open up more possibilit ...
Cybersecurity Hygiene Technology Practices Vol.1 A Universal Guide to Begin Practicing Good Cybersecurity Hygiene Shelly Waite-Bey
Books with a 5 star rating(1)
$30.00
Size: 6" x 9"
Binding: Perfect Bound
ISBN: 9781637904169
Cybersecurity is like an art. Think of how precise a line must be for an artist to create or finish a masterpiece. The same precision an artist has is similar to an expert in Cybersecurity. In Cybersecurity, the network (line) must also be as precise and have the most security for performance. Basic Cybersecurity Hygiene is the bare minimum security controls, practices and/or measures needed for a network. Proactive Cybersecurity is not only monitoring the network but also preparing to improve the culture and what's on the network from an even more secure perspective. Cybersecurity Hygiene Technology Practices Vol.1, A Universal Guide to Begin Practicing Good Cybersecurity Hygi ...
dBASE PLUS 11 Language Reference - Volume 1 of 2 Mike Rozlog
Books with a 0 star rating(0)
$49.95
Size: 8.5" x 11"
Binding: Spiral Bound
Language Reference Volume 1 of 2 for dBASE PLUS 11. dBASE PLUS is a 32-bit rapid application development (RAD) environment for the creation of powerful database applications and data-driven web applications. It features flexible interactive database administration tools, an advanced third-generation object-oriented programming model, and a high level of backward compatibility. Its rich assortment of powerful Windows and Web tools, including Table, Form, Menu and Report designers makes modeling, managing, retrieving and reporting information easier and faster than ever before. The Borland Database Engine (BDE) included with your package allows easy connectivity to dBASE tables—includin ...

Page: 1 of 3 << < 1 2 3 > >>

Quick Links
You Are Looking In
SubCategories
Ratings
  • 5 star rating(3)
  • 4 star rating(1)
  • Books with a 3 star rating(0)
  • Books with a 2 star rating(0)
  • Books with a 1 star rating(0)
Price