Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Joomla!: Visual QuickStart Guide (2nd Edition)
Joomla!: Visual QuickStart Guide (2nd Edition)

Building on the first edition of Joomla!: Visual QuickStart Guide, this task-based guide is the perfect tool for those just starting with Joomla, as well as, seasoned professionals who want to know how to use the latest version of the software to its fullest. It shows how to create, customize, and maintain a dynamic Joomla 1.6 website...

Smart Graphics: 11th International Symposium on Smart Graphics, Bremen, Germany, July 18-20, 2011
Smart Graphics: 11th International Symposium on Smart Graphics, Bremen, Germany, July 18-20, 2011

The International Symposium on Smart Graphics serves as a scientific forum that attracts researchers and practitioners from the fields of computer graphics, artificial intelligence, cognitive science, human–computer interaction, interface design, and information visualization. Initiated by Andreas Butz, Antonio Kr¨uger, and...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Google AdWords: Managing Your Advertising Program
Google AdWords: Managing Your Advertising Program
Since being selected as an AdWords Seminar Leader by Google in 2006, I’ve had the opportunity to teach thousands of businesses and organizations how to use AdWords, Google’s advertising platform. I believe in the product; if used appropriately, it offers vast online exposure for advertisers....
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011

This volume of Springer Lecture Notes in Computer Sciences (LNCS) constitutes the final publication of the EU COST 2101 Action “Biometrics for Identity Documents and Smart Cards,” which has been successfully running during the years 2006-2010. One of the many valuable outputs of this initiative is the realization of a new...

Microsoft Office 365: Connect and Collaborate Virtually Anywhere, Anytime
Microsoft Office 365: Connect and Collaborate Virtually Anywhere, Anytime

Train. Coffee shop. Soccer field. Now you can connect, collaborate, and get things done—virtually anywhere—using Microsoft Office 365. Guided by business productivity expert Katherine Murray, you’ll get a running start with Office 365 cloud-based business services. And you’ll take wing as you learn best...

Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

Result Page: Previous 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy