Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft  Windows Vista Step by Step
Microsoft Windows Vista Step by Step
Windows Vista is the latest and greatest in the illustrious line of Windows operating systems from Microsoft. The successor to Microsoft Windows XP, this operating system is specifically designed to fill the needs of both business and personal users. As soon as you turn on a computer running Windows Vista, you'll notice the slick look of the new...
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud
Monetizing Machine Learning: Quickly Turn Python ML Ideas into Web Applications on the Serverless Cloud

Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book?Amazon, Microsoft, Google, and PythonAnywhere.

You will work through a series of common Python data science problems...

Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
HP-UX Virtual Partitions
HP-UX Virtual Partitions

vPars: The breakthrough solution for maximizing HP 9000 utilization, flexibility, and manageability.

  • The authoritative guide to breakthrough Virtual Partitions (vPars) technology for HP-UX
  • Transform virtually any HP 9000 into multiple "virtual" computers
  • Includes practical examples and...
Java and the Java Virtual Machine: Definition, Verification, Validation
Java and the Java Virtual Machine: Definition, Verification, Validation
This book provides a high-level description, together with a mathematical and an experimental analysis, of Java and of the Java Virtual Machine (JVM), including a standard compiler of Java programs to JVM code and the security critical bytecode verifier component of the JVM. The description is structured into language layers and machine components....
David Busch's Compact Field Guide for the Nikon D5000
David Busch's Compact Field Guide for the Nikon D5000

Are you tired of squinting at the tiny color-coded tables and difficult-to-read text you find on the typical laminated reference card or cheat sheet that you keep with you when you're in the field or on location? DAVID BUSCH'S COMPACT GUIDE FOR THE NIKON D5000 is your solution! This new, lay-flat, spiral bound, reference guide...

iPhone Game Blueprints
iPhone Game Blueprints

If you're looking for inspiration for your first or next iPhone game, look no further. This brilliant hands-on guide contains 7 practical projects that cover everything from animation to augmented reality. Game on!

Overview

  • Seven step by step game projects for you to build
  • Cover all...
Cascading Style Sheets: Designing for the Web, Third Edition
Cascading Style Sheets: Designing for the Web, Third Edition

Direct from the creators of CSS, this is the definitive reference to CSS 2.1, today's indispensable standard for controlling the appearance of any Web or XML document. This full-color book doesn't just show how to use every significant CSS 1 and 2.x feature; it carefully explains the "why" behind today's most...

3D Printing Designs: Fun and Functional Projects
3D Printing Designs: Fun and Functional Projects

Get to grips with 3D printing and learn to model designs using Blender

About This Book

  • From the author who brought you the first practical look at 3D printing with 3D Printing Blueprints
  • Get a comprehensive coverage of the prototyping techniques you need to know to start printing your own...
How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

Algorithms Unlocked
Algorithms Unlocked

Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves...

Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy