 |
|
|
 Science Teaching with Moodle 2.0
Moodle is becoming increasingly popular in schools worldwide due to its ease of use and flexibility. Science is the perfect subject to benefit from the features of Moodle as students will find it the easiest to learn with the help of interactive content, rather than reading textbooks. This book will teach you how to create quizzes, start... |  |  SharePoint 2010 Disaster Recovery Guide
If you’ve done any previous research on SharePoint disaster recovery topics, such as content recovery, backup and restore, and high availability, you’ve probably found quite a bit of information on the subject. That held true for us when we wrote the original Disaster Recovery Guide for SharePoint 2007, and it’s just as true... |  |  The Book of Webmin: Or How I Learned to Stop Worrying and Love UNIX
Webmin is a web-based graphical UNIX system administration tool written by Jamie Cameron in the Perl programming language that is designed to be lightweight, functional, and easily extensible. Webmin has been translated to over 20 languages and dialects at the time of this writing, and it has been embraced by a number of... |
|
|
 CompTIA A+ 220-701 and 220-702 Practice Questions Exam Cram (4th Edition)
Welcome to CompTIA A+ Practice Questions Exam Cram. The sole purpose of this book is to provide you with practice questions that are complete with answers and explanations to help you learn, drill, and review for the CompTIA A+ certification exam. The book offers many questions that will help you practice each exam objective and will help you... |  |  Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a... |  |  Out of the Inner Circle: A Hacker's Guide to Computer Security
This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system.... |
|
| Result Page: 1337 1336 1335 1334 1333 1332 1331 1330 1329 1328 1327 1326 1325 1324 1323 1322 1321 1320 1319 |