Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PC Hacks : 100 Industrial-Strength Tips &Tools
PC Hacks : 100 Industrial-Strength Tips &Tools
Covering both Windows and Linux, PC Hacks combines the bestselling Hacks series style with the world's most popular computing hardware. Hacks for enhancing performance and preventing problems with your PC include overclocking CPU and video cards, tweaking RAM timing, selecting the best performing components,...
HTTP Pocket Reference : Hypertext Transfer Protocol
HTTP Pocket Reference : Hypertext Transfer Protocol

This book describes HTTP, the Hypertext Transfer Protocol. It provides a high level description of how the protocol works, along with reference information on client requests and server responses. Included are dumps of HTTP transactions, as well as tabular data that summarizes most of the standardized parameters used in...

Practical C++ Programming, Second Edition
Practical C++ Programming, Second Edition

This book is devoted to practical C++ programming. It teaches you not only the mechanics of the language, but also style and debugging. The entire life cycle of a program is discussed, including conception, design, writing, debugging, release, documentation, maintenance, and revision.

Style is emphasized....

Python Programming On Win32 : Help for Windows Programmers
Python Programming On Win32 : Help for Windows Programmers

This book is about using Python to get jobs done on Windows.

We hope by now you have heard of Python, the exciting object-oriented scripting language that is rapidly entering the programming mainstream. Although Python is perhaps better known on the Unix platform, it offers a superb degree of integration with the Windows...

Kerberos: The Definitive Guide
Kerberos: The Definitive Guide
Kerberos is a sophisticated network authentication system—one that has been publicly available since 1989 and provides that eternal holy grail of network administrators, single-sign-on. Yet, in that intervening decade, documentation on Kerberos has been notably lacking. While many large organizations and academic institutions have enjoyed the...
Web Database Applications with PHP & MySQL
Web Database Applications with PHP & MySQL
Web database applications integrate databases and the Web. Well-known web destinations such as online auction sites, retail stores, news sites, discussion forums, and personalized home pages are all examples of web database applications. The popularity of these applications stems from their accessibility and usability: thousands of users...
XML in a Nutshell, Third Edition
XML in a Nutshell, Third Edition
There's a lot to know about XML, and it s constantly evolving. But you don't need to commit every syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third...
Java Network Programming, Third Edition
Java Network Programming, Third Edition

Java's growth over the last 10 years has been nothing short of phenomenal. Given Java's rapid rise to prominence and the even more spectacular growth of the Internet, it's a little surprising that network programming in Java is still so mysterious to so many. It doesn't have to be. In fact, writing network programs in Java...

C in a Nutshell
C in a Nutshell

Learning a language--any language--involves a process wherein you learn to rely less and less on instruction and more increasingly on the aspects of the language you've mastered. Whether you're learning French, Java, or C, at some point you'll set aside the tutorial and attempt to converse on your own. It's not necessary to know...

Hibernate: A Developer's Notebook
Hibernate: A Developer's Notebook

Hibernate is a lightweight object/relational mapping service for Java. What does that mean? It's a way to easily and efficiently work with information from a relational database in the form of natural Java objects. But that description doesn't come close to conveying how useful and exciting the technology is. I'm not the only...

PayPal Hacks
PayPal Hacks

PayPal wasn't the first company to build an online payment system, but it might as well be the last. With over 50 million registered accounts, PayPal is rapidly becoming a household name. But, as indicated, there have been others; PayPal's predecessors attempted to capitalize on the Internet boom by building new forms of...

Practical Unix & Internet Security, Second Edition
Practical Unix & Internet Security, Second Edition
This book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum...
unlimited object storage image
Result Page: 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy