Home | Amazing | Today | Tags | Publishers | Years | Search 
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The content goes from the basics to advanced topics such as off-shoring, anti-circumvention, open source business models, user-created content, reverse engineering, mobile media distribution, web and game development, mash-ups, web widgets, and massively multiplayer games.

This book is designed to empower you to:

* Understand
...
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
Plan and launch your PPC campaign and keep track of its progress

If you want potential customers to form a traffic jam at your Web site, Pay Per Click just might do the trick. This book will help you decide! It tells you all about Google AdWords and Yahoo! Sponsored Search, targeting your customers, watching out for fraud, assessing the pros...

UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
MCSE: ISA Server 2000 Administration Study Guide: Exam 70 227 with CDROM
MCSE: ISA Server 2000 Administration Study Guide: Exam 70 227 with CDROM

Here’s the book you need to prepare for Exam 70-227, Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000, Enterprise Edition:

  • In-depth coverage of every exam objective—all the information you need to know
  • Practical...
Internet Technologies Handbook: Optimizing the IP Network
Internet Technologies Handbook: Optimizing the IP Network
The Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -...
Introducing Maya 6: 3D for Beginners
Introducing Maya 6: 3D for Beginners

"If you're just beginning to dive into the world of 3D, this is the book for you."
--Animation Magazine

Alias' Academy Award winning Maya 3D animation and effects software leads the industry in technological innovation. Film and video artists, computer game developers,...

Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

Upgrading & Fixing Laptops For Dummies (Computer/Tech)
Upgrading & Fixing Laptops For Dummies (Computer/Tech)
Keep your laptop on top of its game!

Find out how to care for your laptop, what can go wrong, and what you can fix

A laptop is much more than a PC that shrank. It has unique needs, and this book shows you how to meet them. You'll discover how to diagnose and fix common problems, replace parts, add external upgrades, and develop...

Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Introducing service orientation as a vision and philosophy that can impact a business, this innovative new book equips the reader to:
  • Best use technology resources to meet goals
  • Unleash their "inner nerd" to embrace IT as part of their business as a whole
  • Address the "mother of all business...
Build the Ultimate Home Theater PC
Build the Ultimate Home Theater PC
The best of both worlds—now THIS is entertainment

You love tinkering with technology. The digital lifestyle is your lifestyle. So building your own Home Theater PC just might be as entertaining as using it. In these pages, a couple of fellow tinkerers explain the components and subsystems of a Home Theater PC and help you choose and pur-...

Result Page: 669 668 667 666 665 664 663 662 661 660 659 658 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy