Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Writing Secure Code, Second Edition
Writing Secure Code, Second Edition

If you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building...

Using Samba, Second Edition
Using Samba, Second Edition
Using Samba, Second Edition is a comprehensive guide to Samba administration. This new edition covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores...
Mac OS X Help Line, Tiger Edition
Mac OS X Help Line, Tiger Edition
With every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted...
Joel on Software
Joel on Software

This is a selection of essays from the author's Web site, http://www.joelonsoftware.com. Joel Spolsky started the web log in March 2000 in order to offer his insights, based on years of experience, on how to improve the world of programming. His extraordinary writing skills, technical knowledge, and caustic wit have made him a programming guru....

Programming Excel with VBA and .NET
Programming Excel with VBA and .NET

Why program Excel? For solving complex calculations and presenting results, Excel is amazingly complete with every imaginable feature already in place. But programming Excel isn't about adding new features as much as it's about combining existing features to solve particular problems. With a few modifications, you can transform...

Developing Software for Symbian OS : An Introduction to Creating Smartphone Applications in C++ (Symbian Press)
Developing Software for Symbian OS : An Introduction to Creating Smartphone Applications in C++ (Symbian Press)
By the end of March 2005, shipments of Symbian OS phones exceeded
an average of two million per month, and cumulative shipments since
Symbian’s formation reached 32 million phones. Also at that time, there
were more than 4500 commercially available, third-party applications for
Symbian OS phones. Year on year, phone
...
Mastering Mambo: E-Commerce, Templates, Module Development, SEO, Security, and Performance
Mastering Mambo: E-Commerce, Templates, Module Development, SEO, Security, and Performance
If you type "Mambo" into a search engine, you get a ton of hits. Testing this with Google
resulted in almost six million references. But only some of these concerned themselves with the Afro-Cuban style of music and dance made popular by the movie Dirty Dancing. Most lead to one of today's most popular content management systems,
...
First Look 2007 Microsoft  Office System
First Look 2007 Microsoft Office System
Your wishes are granted! The new release that is the focus of this book—2007 Microsoft Office
system—has been designed to answer just these kinds of needs for people working with information
the world over. The 2007 release not only offers better integration, enhanced communication,
professional presentation, and expanded
...
Windows Server 2003 Pocket Administrator
Windows Server 2003 Pocket Administrator
Twenty years ago, when most computers were mainframes
or minicomputers, operators and administrators had
scheduled, specific tasks they needed to perform on an
ongoing basis. Each time a task was performed, they had
to make note of the time and write their initials in a
logbook to demonstrate when the task was performed...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Instructional Engineering in Networked Environments (Tech Training Series)
Instructional Engineering in Networked Environments (Tech Training Series)
A Dynamic, Research-Based Approach to Knowledge Management

In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked...

AdvancED ActionScript Components: Mastering the Flash Component Architecture
AdvancED ActionScript Components: Mastering the Flash Component Architecture
Macromedia's architecture is like a chest filled with precious jewels, and this book is quite simply the key to open it! One of the most important tools provided with Flash is the Macromedia Component Architecture: a framework of components written in ActionScript 2, based on established design patterns, that provides a wealth of functionality you...
unlimited object storage image
Result Page: 2327 2326 2325 2324 2323 2322 2321 2320 2319 2318 2317 2316 2315 2314 2313 2312 2311 2310 2309 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy