 |
|
 Mac Kung Fu: Over 400 Tips, Tricks, Hints, and Hacks for Apple OS X
Squeeze every drop of juice from OS X with over 400 quick and easy tips, tricks, hints and hacks in Mac Kung Fu: Second Edition . Exploit secret settings and hidden apps, push built-in tools to the limit, radically personalize your Mac experience, and make "it just works" even better. In addition to core OS X... |  |  Capturing New Markets: How Smart Companies Create Opportunities Others Don't
Hero of Alexandria had a great idea. In the first century ad, Hero’s design of the fi rst steam engine was ingenious and workable. Indeed, classical scholars have argued that it could have been combined with other inventions of the era to create a steam locomotive and railroad, transforming commerce and military affairs in the ancient... |  |  Business Model You: A One-Page Method For Reinventing Your Career
A one-page tool to reinvent yourself and your career
The global bestseller Business Model Generation introduced a unique visual way to summarize and creatively brainstorm any business or product idea on a single sheet of paper. Business Model You uses the same powerful one-page tool to teach readers how to draw... |
|
 Raspberry Pi A Quick-Start Guide
Over the past decades computers have gotten cheaper and cheaper, so today
you can find them not only beneath your desk but in nearly every consumer
electronics device such as smartphones or DVD players. Still, computers
aren’t so cheap that you spontaneously buy one when shopping for your
groceries. Usually, you carefully... |  |  Beginning ASP.NET 4.5: in C# and VB
TO BUILD EFFECTIVE AND ATTRACTIVE database-driven websites, you need two things: a solid and fast framework to run your web pages on and a rich and extensive environment to create and pro- gram these web pages. With ASP.NET 4.5 and Visual Studio 2012 you get both. Together they form the platform to create dynamic and interactive websites.
... |  |  Virtualization Security: Protecting Virtualized Environments
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,... |
|
|
|
Result Page: 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 |