Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
The Focal Easy Guide to Adobe Audition 2.0
The Focal Easy Guide to Adobe Audition 2.0
"Very helpful are the copious and easy to interpret screenshots...Topics can be found easily."
 - Pro Audio Review, Aug. 2006

Software packages are complex. Shouldn't software books make it easier? Simplify your life with the Focal Easy Guide to Adobe ® Audition ® 2.0! This short, full-color book
...
ARM Architecture Reference Manual
ARM Architecture Reference Manual
The ARM architecture is the industry's leading 16/32-bit embedded RISC processor solution. ARM Powered microprocessors are being routinely designed into a wider range of products than any other 32-bit processor. This wide applicability is made possible by the ARM architecture, resulting in optimal system solutions at the crossroads of high...
Succeeding At Your Yahoo! Business
Succeeding At Your Yahoo! Business

The Yahoo! Stores have grown into one of the largest online shopping destinations on the Web today. The nearly 20,000 Yahoo! Stores have a 71% reach among online consumers, the highest on the Web. Many of these stores have become so successful that they have grown from small 'mom and pop' or part time businesses into full time...

SQL Server 7 Backup & Recovery
SQL Server 7 Backup & Recovery
Protect your organization's most valuable asset--its data. Develop and implement a thorough data protection solution for your SQL Server 7 database environment. SQL Server 7 Backup & Recovery is your one-stop resource for planning, developing, implementing, and managing backup and restore procedures. Learn to execute data protection strategies,...
Mac OS X and the Digital Lifestyle
Mac OS X and the Digital Lifestyle
As a dedicated Mac user, you have experienced the power that applications like iMovie, iDVD, and iTunes can give you over your digital media. Ever wonder what you could do if you combined these tools with QuickTime, iPhoto, and iTools? The result is a complete digital lifestyle that allows you to master your digital domain. Mac OS X and the Digital...
Computers & Typesetting, Volume A: The TeXbook
Computers & Typesetting, Volume A: The TeXbook
This guide to computer typesetting using TeX is written by Donald Knuth, the system's creator. TeX offers both writers and publishers the ability to produce plain or technical text, especially text containing a great deal of mathematics, comparable to the work of the finest printers. Novice and expert alike will find The TeXbook useful; it is...
C#.net Web Developer's Guide
C#.net Web Developer's Guide
This volume teaches Web developers to build solutions for the Microsoft .NET platform. Web developers will learn to use C# components to build services and applications available across the Internet.

The focus of The C#.NET Web Developer’s Guide is on providing you with code examples that will help you leverage the
...
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Fireworks MX: A Beginner's Guide
Fireworks MX: A Beginner's Guide

Essential Skills for First-Time Designers

Create beautiful artwork and Web graphics--even if you're a newcomer to graphic design. Cover the basics--vector drawing tools, bitmap image editing, and animation files--then learn all the powerful tools and features of Fireworks MX. Create Web-ready graphics including buttons, banners, and...

Free as in Freedom: Richard Stallman's Crusade for Free Software
Free as in Freedom: Richard Stallman's Crusade for Free Software
In 1984, Richard Stallman launched the GNU Project for the purpose of developing a complete UNIX-like operating system that would allow for free software use. What he developed was the GNU operating system. (GNU is a recursive acronym for "GNU's Not UNIX,'' and it is pronounced guh-NEW. Linux is a variant of the GNU operating system.) This...
Result Page: 2275 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 2263 2262 2261 2260 2259 2258 2257 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy