Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Mahara 1.2 E-Portfolios: Beginner's Guide
Mahara 1.2 E-Portfolios: Beginner's Guide

Mahara is a user-centred environment with a permissions framework that enables different views of an e-portfolio to be easily managed. These views helps you display your artefacts - text files, spreadsheets, images, and videos - in a way you choose and to the people you want. You can also create online communities and social networks through...

Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench
Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench

Some TIME ago a group of mathematicians and computer scientists (including the editors of this volume) thought of making a scientific pilgrimage to the birthplace of al-Khw&rizmf, the outstanding ninth-century mathematician who gave his name to the word "algorithm". As his name indicates, al-Khwarizmi came from the Khorezm...

The Mac OS X Lion Project Book
The Mac OS X Lion Project Book

Managing files and finding stuff after you’ve organized it are things you’ll know about after reading this chapter. The chapter also covers loading up on applications, both from the App Store and directly from developers’ Web sites. (If you’re not sure now what the differences are, don’t...

Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Social Media Marketing eLearning Kit For Dummies
Social Media Marketing eLearning Kit For Dummies

Valuable kit teaches social media marketing to learners of all levels If you want to master social media marketing, this valuable eLearning kit is just the ticket. This integrated course includes a full-color printed book and a Dummies interactive eLearning course on CD. You'll find a wealth of information and multiple ways to learn,...

PrimeFaces Cookbook
PrimeFaces Cookbook

Here are over 100 recipes for PrimeFaces, the ultimate JSF framework. It’s a great practical introduction to leading-edge Java web development, taking you from the basics right through to writing custom components.

Overview

  • The first PrimeFaces book that concentrates on practical approaches rather...
Yogurt Every Day: Healthy and Delicious Recipes for Breakfast, Lunch, Dinner and Dessert
Yogurt Every Day: Healthy and Delicious Recipes for Breakfast, Lunch, Dinner and Dessert

Hailed as a superfood and loved for its cool, tangy taste, yogurt's popularity continues to grow. Yogurt Every Day feeds this frenzy for yogurt, serving up 75 delicious recipes for breakfast, lunch, dinner, snacks and dessert, including how to make your own yogurt at home.


After years of
...

The Early Pioneers of Steam: The Inspiration Behind George Stephenson
The Early Pioneers of Steam: The Inspiration Behind George Stephenson
We think of the Stephensons and Brunel as the fathers of the railways, and their Liverpool and Manchester and Great Western Railways as the prototypes of the modern systems. But who were the railways' grandfathers and great grandfathers? For the rapid evolution of the railways after 1830 depended to a considerable degree upon the...
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))

The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5–6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students...

Sams Teach Yourself Word 2003 in 24 Hours
Sams Teach Yourself Word 2003 in 24 Hours
For readers who are new to Word 2003 and want to get up and running quickly, Sams Teach Yourself Microsoft Word 2003 in 24 Hours will do the trick. This book includes shortcuts and ways to accomplish the most common tasks in Word. Readers are able to work at their own pace through the easily digestible, one-hour...
Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
unlimited object storage image
Result Page: 298 297 296 295 294 293 292 291 290 289 288 287 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy