Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Expression Web 3 In Depth
Microsoft Expression Web 3 In Depth

Beyond the Basics…Beneath the Surface…In Depth

 

Microsoft Expression Web 3

 

Advice and techniques that you need to get the job done.

 

...
Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Wi-Fi Hotspots: Setting Up Public Wireless Internet Access (Networking Technology)
Wi-Fi Hotspots: Setting Up Public Wireless Internet Access (Networking Technology)

Wi-Fi Hotspots

Setting Up Public Wireless Internet Access

Installing and operating a Wi-Fi hotspot allows you to attract customers and differentiate your business. Deploying even a small wireless network has proven to be a...

User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
The 19th International Conference on User Modeling, Adaptation and Personalization (UMAP 2011) took place in Girona, Spain, during July 11–15, 2011. It was the third annual conference under the UMAP title, which resulted from the merger in 2009 of the successful biannual User Modeling (UM) and Adaptive Hypermedia (AH)...
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition) (Self-Study Guide)
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition) (Self-Study Guide)

Foundation Learning for CCVP IP Telephony

Jeremy Cioara, CCIEВ® No. 11,727

Cisco IP Telephony (CIPT), Second Edition, is a CiscoВ®-authorized, self-paced learning tool for CCVP IP...

LAN Wiring
LAN Wiring
250+ detailed illustrations

The bestselling, state-of-the-art guide to cable installation for voice and data revised and updated to reflect the very latest advances and standards

Packed with essential time- and trouble-saving information, and written by a 25-year cabling veteran, LAN...

Ransomware: Defending Against Digital Extortion
Ransomware: Defending Against Digital Extortion

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the...

The 7 Irrefutable Rules of Small Business Growth
The 7 Irrefutable Rules of Small Business Growth
MASTER THE SECRETS OF SUSTAINED GROWTH

"Steve is a true storyteller, and it's his real-world stories that bring these rules to life. This book is both a great read and a practical guide to reaching the next level. Here's something else that is irrefutable...Steven Little is the business growth expert!"
—Lee Jones
...

Bricks to Clicks: Why Some Brands Will Thrive in E-Commerce and Others Won't
Bricks to Clicks: Why Some Brands Will Thrive in E-Commerce and Others Won't
Learn how to sell online. Real-world case studies and market insights from the world's largest brands reveal what the best brands are doing right to win online. Gain knowledge of best practices that enable brands and retailers to survive and thrive in the dynamic, fast-paced, and highly competitive world of e-commerce.

...
Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Handbook of Thermoset Plastics, Third Edition (PDL Handbook)
Handbook of Thermoset Plastics, Third Edition (PDL Handbook)

Thermosetting plastics are a distinct category of plastics whose high performance, durability and reliability at high temperatures makes them suitable for specialty applications ranging from automotive and aerospace through to electronic packaging and consumer products (your melamine kitchen worktop is a thermoset resin!). Recent developments...

Silverlight 4 Business Intelligence Software
Silverlight 4 Business Intelligence Software

Business Intelligence (BI) software allows you to view different components of a business using a single visual platform, which makes comprehending mountains of data easier. BI is everywhere. Applications that include reports, analytics, statistics, and historical and predictive modeling are all examples of BI. Currently, we are in the second...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy