Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours

Buy
Sams Teach Yourself Access 2002 Programming in 24 Hours will considerably improve the quality of the database applications that the reader can create with Microsoft Access. Concise tutorials that quickly bring the reader up to speed will be the goal of each chapter. Having completed this book, the readers will be able to understand any sample VBA code that they see, and will possess the skills to attack all of the most common Access programming tasks.

Topics covered in the book will include:¨
* Using data aware controls¨
* Creating data aware web pages¨
* Creating views to organize data¨
* Building reusable code modules¨
* Programming reports ¨
* Communicating results with graphing¨
* Automating contact and task management with Outlook¨
* Access programming for Internet Explorer

About the Author

Paul Kimmel is the founder of Software Conceptions. Software Conceptions provides software development and consulting services to small, medium, and large companies worldwide. Paul has been developing business solutions in Microsoft Access for more than 10 years and is available for consulting and development projects (at pkimmel@softconcepts.com).

Paul is the author of several books on Visual Basic and Access programming, including the upcoming Visual Basic.NET Unleashed, and is the co-author of Sams Microsoft Access 2002 Development Unleashed. Paul is the weekly author of the free newsletter Code Guru Visual Basic Tech Notes from Internet.com. Paul resides in Okemos, Michigan with wife Lori and children Trevor, Douglas, Alex, and Noah, all accompanied by their assorted critters.

(HTML tags aren't allowed.)

The Uncertain Web
The Uncertain Web

What’s the best way to develop for a Web gone wild? That’s easy. Simply scrap the rules you’ve relied on all these years and embrace uncertainty as a core tenet of design. In this practical book, veteran developer Rob Larsen outlines the principles out what he calls The Uncertain Web, and shows you techniques...

A First Look at ASP.NET v 2.0
A First Look at ASP.NET v 2.0

Drawing on extraordinary insider access to Microsoft's ASP.NET development team, three renowned ASP.NET experts cover every key platform enhancement, from Master Page templates for standardizing look and feel to improved security and data- access controls. They go far beyond already published white papers and previews, presenting...

Refactoring SQL Applications
Refactoring SQL Applications
What can you do when database performance doesn't meet expectations? Before you turn to expensive hardware upgrades to solve the problem, reach for this book. Refactoring SQL Applications provides a set of tested options for making code modifications to dramatically improve the way your database applications function. Backed by real-world...

Investing Without Borders: How Six Billion Investors Can Find Profits in the Global Economy
Investing Without Borders: How Six Billion Investors Can Find Profits in the Global Economy

An insightful examination of the skills needed to be a proactive investor and find diverse investment opportunities in the emerging economy

There is no little league on Wall Street and no white belts. Here or abroad, you are put in immediately with the black belts – the best and the brightest. Think like an amateur and they...

Smashing jQuery (Smashing Magazine Book Series)
Smashing jQuery (Smashing Magazine Book Series)

jQuery has become a part of my everyday routine in Web design and development, so when Wiley approached me about writing a book on jQuery, I was thrilled. jQuery has opened up a world of possibility for Web design. Th rough this book, I hope to show others how using jQuery can really speed up your development time and allow you to write...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy