 |
|
 C: The Complete Reference, 4th Ed.
The Ultimate Resource on C—Thoroughly Updated for the New C Standard.
A new ANSI/ISO standard for C, called C99, has been recently adopted and Herb Schildt, the world's leading programming author, has updated and expanded his best-selling reference on C to cover it. Whether you are a beginning C programmer or a seasoned... |  |  Network Security: A Beginner's GuideLearn network security basics using this practical guide
Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to... |  |  How to Do Everything with Adobe® Acrobat® 6.0 (Windows)Harness the power of Adobe Acrobat to create and publish sophisticated PDF (Portable Document Format) documents. From simple memos to interactive forms, learn why Acrobat is the tool for any electronic publishing task--including projects that require multimedia. Create, enhance, and edit PDF documents, or use the Internet to share working PDF... |
|
 Microsoft Office Access 2003: The Complete ReferenceThe Definitive Resource on Access 2003
CD-ROM contains quick reference section on Access 2003--plus sample database files that support the book's material
Scale mountains of data with a single application with the help of this comprehensive resource. Through detailed, step-by-step instructions, you'll learn how to design and... |  |  Mac OS X Tiger in a Snap (Sams Teach Yourself)A computer is a big investment, but the time you spend to learn your way around it shouldn't be. Mac OS X Tiger In a Snap is designed specifically for you and the millions of other people who don't have the time to devote to learning the Mac operating system inside and out before you begin using it. The modular format of Mac OS X Tiger In a... |  |  The Shellcoder's Handbook: Discovering and Exploiting Security HolesUncover, exploit, and close security holes in any software or operating system
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This... |
|
|
 Firefox and Thunderbird Garage (The Garage Series)Welcome to the next Internet revolution
Enter your Firefox and Thunderbird Garage...where you master the incredible free software that's helping millions of people use the Web and email faster, more efficiently, and more safely. Your guides know Firefox and Thunderbird better than anyone.... |  |  Platinum Edition Using Microsoft Windows XPWhile most Windows books concentrate on a ground floor approach, Platinum Edition Using Microsoft Windows XP takes an entirely different approach - one that assumes the reader is a bona fide Windows black belt who wants or needs to manage multiple users in a networked environment, turbocharge a Windows installation with registry tweaks or stop... |  |  XML Programming (Core Reference) When first exposed to the Extensible Markup Language (XML), you might ask yourself how it fits in the overall picture of Web-related items. This is the same question developers, managers, and presidents ask, not only of their peers, but of themselves as well. Ironically, this is the same question people in those roles asked themselves years ago... |
|
Result Page: 2278 2277 2276 2275 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 2263 2262 2261 2260 |