Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Ultimate VB.NET and ASP.NET Code Book
The Ultimate VB.NET and ASP.NET Code Book

Have you noticed that the majority of .NET books seem intent on hiding you from real-world code? You can buy a 1,500-page draft excluder, study it intensively for a month, and still be none the wiser as to how to write basic programs. This book isn’t like that.

Within these pages, you’ll learn how to create exciting new...

PHP and MySQL for Dummies, Second Edition
PHP and MySQL for Dummies, Second Edition
Updated for PHP 5 and MySQL 4

Create dynamic, interactive Web pages on Windows®, Linux®, or Mac OS® X systems

Open up a whole new world of Web database applications with PHP and MySQL, the perfect open source pair! This handy guidebook shows you how, with sample applications of an...

Social Media Marketing: An Hour a Day
Social Media Marketing: An Hour a Day

Pick one. Test-drive a few luxury sports cars. A Ferrari, a Lamborghini, a Maserati maybe? Or compare the top First Growth Bordeaux from 2005. Maybe an Haut-Brion, Latour and Mouton-Rothschild? Alternatively, go play in a social media application. Perhaps creating your profile on Facebook or blogging about your passions or sharing...

Photoshop CS All-in-One Desk Reference for Dummies
Photoshop CS All-in-One Desk Reference for Dummies
10 books in 1 – plus 16 pages of full-color examples!

Your one-stop guide to using all the cool features of Photoshop CS

You know you can do amazing things with Photoshop CS, but wow – where do you start? One feature at a time, with this handy reference guide! Ten easy-to-follow minibooks show you how to set up...

How to Cheat at Designing Security for a Windows Server 2003 Network
How to Cheat at Designing Security for a Windows Server 2003 Network
When looking at an organization's security needs, you should begin with any existing security policies or procedures that the organization might already have in place. We started this chapter with an in-depth examination of how to analyze a company's business requirements for network and data security. This included looking at these existing...
How to Cheat at Deploying and Securing RFID
How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security
...
Digital Video For Dummies (Computer/Tech)
Digital Video For Dummies (Computer/Tech)
So you have a camcorder and visions of being the next Spielberg. But how do you progress from shooting so-so footage to showing your own finished movie? Digital Video For Dummies, 4th Edition gives you the know-how and the show-how! Find out how to shoot and edit great movies, using iMovie, Windows Movie Maker, or Adobe Premiere Elements...
Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense

"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...

 
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy