|
|
|
|
Bitcoin for the Befuddled
Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin—the game-changing digital currency used by millions worldwide.
But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions... | | Building E-Commerce Sites with Drupal Commerce Cookbook
Get your online store up and running the easy way with this guide to Drupal Commerce. Designed primarily for beginners, it takes you from building the store to managing details such as tax and customer profiles.
Overview
-
Learn how to build attractive E-commerce sites with Drupal Commerce.
- ...
| | Selling Digital Music, Formatting Culture
Selling Digital Music, Formatting Culture documents the transition of recorded music on CDs to music as digital files on computers. More than two decades after the first digital music files began circulating in online archives and playing through new software media players, we have yet to fully internalize the cultural and aesthetic ... |
|
IT Auditing: Using Controls to Protect Information AssetsPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and... | | Google Analytics 2.0Site Stats on Steroids
Is your Web site serving its purpose? To find out, you need to analyze factors related to what the site is supposed to do. Site statistics give you raw numbers, but Web analytics are like site stats on steroids. Analytics crunch those raw numbers into meaningful metrics—information you... | | Network Security: A Beginner's Guide, Second EditionEssential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack... |
|
|
Dreamweaver CS5 For Dummies
A fully updated guide to the leading Web site creation tool, Dreamweaver CS5
Dreamweaver holds 90 percent of the market share for professional Web site development software. This popular book, which has sold more than 300,000 copies in previous editions, is fully updated for the newest version of Dreamweaver. Both beginning... | | Pro PHP Security
The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your... | | Computing Information Technology: The Human SideFrom the senior management to the clerical and support group levels, this study addresses the possible pitfalls and triumphs of implementing information technology (IT) into organizations in terms of organizational strategies, structures, and communication methods. Issues of human-computer interaction, ethics, privacy, and security are raised to... |
|
|
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 |