Home | Amazing | Today | Tags | Publishers | Years | Search 
Graphics Programming with GDI+
Graphics Programming with GDI+

Graphics Programming with GDI+ explores and exploits a wonderful range of GDI+ programming concepts, techniques, and applications for programmers of beginner to intermediate abilities. Being a prolific contributor to the Internet community of developers, Mahesh Chand is offering what seems to be a natural extension of what he...

Maximum Security (3rd Edition)
Maximum Security (3rd Edition)
Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. In one book, security managers and others interested in computer and network security can learn everything the hackers already know,...
Take Charge of Your Workers' Compensation Claim: An A to Z Guide for Injured Employees in California
Take Charge of Your Workers' Compensation Claim: An A to Z Guide for Injured Employees in California
Orange County Register
A great hands-on guide for dealing with workers’ compensation cases.

From industrial injuries to Carpal Tunnel Syndrome, more than a million Californians a year suffer job-related injuries or illness. For many, receiving compensation can be
...
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
This redbook will help you install, tailor and configure the SuSE Linux 7.0 distribution on different servers of the xSeries and Netfinity class. You will be instructed on how to do the basic installation, and installing and configuring different services such as Apache (http-Server), Samba (Fileserver for Windows-based networks), and Postfix (an...
PHP Programming with PEAR
PHP Programming with PEAR
PEAR is the PHP Extension and Application Repository, and is a framework and distribution system for reusable, high-quality PHP components, available in the form of "packages". The home of PEAR is pear.php.net, from where you can download and browse this extensive range of powerful packages. For most things that you would want to use in...
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
Cognitive Radio Architecture: The Engineering Foundations of Radio XML
Cognitive Radio Architecture: The Engineering Foundations of Radio XML
An exciting new technology, described by the one who invented it 

This is the first book dedicated to cognitive radio, a promising new technology that is poised to revolutionize the telecommunications industry with increased wireless flexibility. Cognitive radio technology integrates computational intelligence into software-defined radio...

Linux Handbook: A Guide to IBM Linux Solutions and Resources
Linux Handbook: A Guide to IBM Linux Solutions and Resources
IBM® has a strong commitment to Linux as an operating system and Linux-based solutions. This IBM Redbook gives a broad understanding of IBM products and how they relate to the Linux operating system. It tries to encapsulate the IBM Software Solutions that are available for Linux-based servers. It also describes the Linux enablement throughout...
Watermarking Systems Engineering
Watermarking Systems Engineering
The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and...
Marketing Without Advertising
Marketing Without Advertising
Milton Moskowitz, co-author, 100 Best Companies to Work for in America
There are good ideas here on every page... the nitty-gritty steps you need to—and can—take to generate sales...

Business Life
...straightforward advice on how to
...
Red Hat Linux 7.2: The Complete Reference, Second Edition
Red Hat Linux 7.2: The Complete Reference, Second Edition

The Most Comprehensive Red Hat Linux Resource Available

Master Red Hat Linux--including version 7.2--using this authoritative reference. Linux guru Richard Petersen provides details on networking, kernel management, Internet servers, system administration, and much more. You'll also get full coverage of Internet clients, office suites,...

.NET 2.0 Interoperability Recipes: A Problem-Solution Approach
.NET 2.0 Interoperability Recipes: A Problem-Solution Approach
It is difficult or impossible to immediately throw out all existing code and start over when
a new technology arrives. That’s the situation with Microsoft .NET. It represents a new and
improved way of developing software for the Windows platform. And, given the chance, you
would likely love to rewrite all of your existing code
...
Result Page: 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy