Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:

  • Shows you how to speed it up, lock it down, or pull back the curtains.
  • Dives into default system settings,...
Wireless Positioning Technologies and Applications (Technology and Applications)
Wireless Positioning Technologies and Applications (Technology and Applications)
At last--here's a comprehensive book that puts full details on all short-range wireless-positioning methods at your command for instant access and use. This one-stop resource surveys each technique's theory of operation, advantages and disadvantages, applicability in different domains, implementation procedures, and accuracy to help you select the...
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Take command of core technologies at the heart of all telecommunications systems with the first book expressly designed to help you apply, reuse, and enhance building-block components from one generation of networks to the next. This unique problem-solver unravels the complexities behind such technologies as synchronization, multiple access,...
Cocoon 2 Programming: Web Publishing with XML and Java
Cocoon 2 Programming: Web Publishing with XML and Java
Thanks to the tireless efforts of open-source developers, Cocoon has quickly gained visibility as the preeminent XML-based Web publishing framework. Unfortunately, its documentation remains a significant shortcoming. If you’re new to Cocoon, gaining a sense of exactly what you can do with it can be difficult, and actually...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
The Linux Cookbook, Second Edition
The Linux Cookbook, Second Edition
The Linux Cookbook, 2nd Edition is your guide to getting the most out of Linux. Organized by general task (such as working with text, managing files, and manipulating graphics), each section contains a series of step-by-step recipes that help you to get your work done quickly and efficiently, most often from the command line. Nearly 50...
ANDROID A PROGRAMMERS GUIDE
ANDROID A PROGRAMMERS GUIDE

Master the Android mobile development platform

Build compelling Java-based mobile applications using the Android SDK and the Eclipse open-source software development platform. Android: A Programmer's Guide shows you, step-by-step, how to download and set up all of the necessary tools, build and tune...

Ubuntu: The Complete Reference (Complete Reference Series)
Ubuntu: The Complete Reference (Complete Reference Series)

The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS

Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up...

When Least Is Best: How Mathematicians Discovered Many Clever Ways to Make Things as Small (or as Large) as Possible
When Least Is Best: How Mathematicians Discovered Many Clever Ways to Make Things as Small (or as Large) as Possible
This book was terrific fun to read! I thought I would skim the chapters to write my review, but I was hooked by the preface, and read through the first 100 pages in one sitting... [Nahin shows] obvious delight and enjoyment--he is having fun and it is contagious. -- Bonnie Shulman MAA Online When Least is Best is clearly the result of immense...
Python for Unix and Linux System Administration
Python for Unix and Linux System Administration
Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them.

Each chapter in Python for Unix and
...
Microsoft Word 2007 Bible
Microsoft Word 2007 Bible
Make Microsoft's brave new Word work for you

Microsoft's Word 2007 rewrites the book on word processing. New to Word? The Word 2007 Bible helps you soar over the hurdles and quickly brings you up to speed. A Word veteran? You'll discover new ways to command legacy features, completely new features to accomplish...

Xcode 3 Unleashed
Xcode 3 Unleashed
Apple’s new Xcode 3 is the most powerful Mac development suite ever created. In Xcode 3 Unleashed, renowned Mac developer Fritz Anderson has written the definitive guide to making the most of Xcode 3 to build any Macintosh or iPhone application.

 

Anderson leads you through a...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy