 |
|
 Cocoon 2 Programming: Web Publishing with XML and JavaThanks to the tireless efforts of open-source developers, Cocoon has quickly gained visibility as the preeminent XML-based Web publishing framework. Unfortunately, its documentation remains a significant shortcoming. If you’re new to Cocoon, gaining a sense of exactly what you can do with it can be difficult, and actually... |  |  Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)Plan and launch your PPC campaign and keep track of its progress
If you want potential customers to form a traffic jam at your Web site, Pay Per Click just might do the trick. This book will help you decide! It tells you all about Google AdWords and Yahoo! Sponsored Search, targeting your customers, watching out for fraud, assessing the pros... |  |  Maximum Apache Security (Maximum Security)The Maximum Security series, which debuted in 1997, has thus far enjoyed relative success. I use the term “relative success,” because security title sales have historically trickled, rather than gushed. For altering this and fostering a new market, Sams editors deserve kudos. Their insights have proven providential: Today, Maximum... |
|
 Internet Technologies Handbook: Optimizing the IP NetworkThe Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -... |  |  Security of e-Systems and Computer NetworksE-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of... |  |  |
|
|
 Crypto Anarchy, Cyberstates, and Pirate UtopiasIn Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence... |  |  An Introduction to Web Design and ProgrammingCombining viewpoints from a Department of Computer Science (Paul Wang) and a School of Visual Communication Design (Sanda Katila), this innovative book covers the design and technology aspects of Web site development in an integrated manner. The balanced perspective leads to an understanding of the artistic design, visual communication, information... |  |  Encyclopedia of Data Warehousing and Mining, Second EditionThe Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400... |
|
| Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |