Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Microsoft Dynamics CRM 2011: Dashboards Cookbook
Microsoft Dynamics CRM 2011: Dashboards Cookbook

This cookbook is full of practical and easily applicable recipes that will teach the user how to understand and unleash the full capabilities of the new dashboard features in Microsoft Dynamics CRM 2011. Starting with basic tasks to build user confidence and general knowledge, the chapters provide insight with helpful tips and related...

SharePoint 2010 for Project Management
SharePoint 2010 for Project Management
Do you find yourself asking for more time whenever you work on a project? Do you ever get the extra time you asked for? Well, if you’re like me, you rarely get the extra time you need from your customers. This got me thinking about how I can buy more time for my projects. I decided to find out if I could gain more time by reducing...
Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television in 2004 celebrates 40 full television seasons. As I wrote in the introduction in 1980 to the original (single) volume that chronicled the genre, the range was as esthetically and technically wide at the time as it would remain through the years since as any theatrical offerings – within its restricted...
Fundamentals of Database Management Systems
Fundamentals of Database Management Systems
A course in database management has become well established as a required course in both undergraduate and graduate management information systems degree programs. This is as it should be, considering the central position of the database field in the information systems environment. Indeed, a solid understanding of the...
Office 2010 Visual Quick Tips
Office 2010 Visual Quick Tips

Get more done in Office 2010 in less time with these Quick Tips!

Whether you're new to Microsoft Office or updating from older versions, this is the perfect resource to get you quickly up to speed on Office 2010. Every application is covered, including Word, Excel, PowerPoint, Outlook, and Publisher. Full-color...

Java 2: The Complete Reference, Fifth Edition
Java 2: The Complete Reference, Fifth Edition

The past few years document the following fact: The Web has irrevocably recast the face of computing and programmers unwilling to master its environment will be left behind.

The preceding is a strong statement. It is also true. More and more, applications must interface to the Web. It no longer matters much what the...

Interactive Storytelling for Video Games: A Player-Centered Approach to Creating Memorable Characters and Stories
Interactive Storytelling for Video Games: A Player-Centered Approach to Creating Memorable Characters and Stories

What really makes a video game story interactive? What's the best way to create an interactive story? How much control should players be given? Do they really want that control in the first place? Do they even know what they want-or are their stated desires at odds with the unconscious preferences? All of these questions and more are...

Network Performance Engineering: A Handbook on Convergent Multi-Service Networks and Next Generation Internet
Network Performance Engineering: A Handbook on Convergent Multi-Service Networks and Next Generation Internet

During recent years a great deal of progress has been made in performance modelling and evaluation of the Internet, towards the convergence of multi-service networks of diverging technologies, supported by internetworking and the evolution of diverse access and switching technologies. The 44 chapters presented in this handbook are revised...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

The Python Standard Library by Example (Developer's Library)
The Python Standard Library by Example (Developer's Library)

Distributed with every copy of Python, the standard library contains hundreds of modules that provide tools for interacting with the operating system, interpreter, and Internet. All of them are tested and ready to be used to jump start the development of your applications. This book presents selected examples demonstrating how to use the most...

Designing Management Information Systems
Designing Management Information Systems

Management information systems produce the information that managers use to make important strategic decisions. They formthe basis for management reports, both financial and non-financial, and as such they are a vital component of modern business management. Few managerial decisions are taken without consulting the data captured by...

Result Page: 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy