Excel Formulas and Functions for Dummies


Ken Bluttman - 2005
    Targets beginning to intermediate Excel users seeking real-world examples of how they can use Excel's powerful built-in functions Shows readers how to use Excel functions in formulas to help them decide between buying and leasing a car, calculate mortgage costs, compute grades, evaluate investment performance, figure college expenses, and more Gives explanations and examples of real-world situations Provides an abbreviated discussion of an additional 200 functions Excel commands nearly 90 percent of the market for spreadsheet applications; although this book is written for Excel 2003, the functions described are in earlier versions as well

Click'd


Tamara Ireland Stone - 2017
    CLICK'D pairs users based on common interests and sends them on a fun (and occasionally rule-breaking) scavenger hunt to find each other. And it's a hit. By the second day of school, everyone is talking about CLICK'D.Watching her app go viral is amazing. Leaderboards are filling up! Everyone's making new friends. And with all the data Allie is collecting, she has an even better shot at beating her archenemy, Nathan, at the upcoming youth coding competition. But when Allie discovers a glitch that threatens to expose everyone's secrets, she has to figure out how to make things right, even if that means sharing the computer lab with Nathan. Can Allie fix her app, stop it from doing any more damage, and win back the friends it hurt-all before she steps on stage to present CLICK'D to the judges?

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.