Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Annoyances: How to Fix the Most Annoying Things about Going Online
Internet Annoyances: How to Fix the Most Annoying Things about Going Online
What began as an intrepid U.S. Government initiative in the early 1970's has turned into a global way of life. Indeed, with more than 500 million current users (and counting), the Internet has revolutionized the way societies function the world over. From dating and shopping online, to conducting informational research, to communicating via email,...
Mac OS X Version 10.2 Jaguar Fast & Easy
Mac OS X Version 10.2 Jaguar Fast & Easy

Relax. Learning how to use this latest version of Mac OS X is now a breeze. With this book’s step-by-step instructions, you’ll be navigating the Mac OS X interface and customizing your Mac in no time. Begin with an introduction to Jaguar and instructions for setting up your desktop. By the time you’ve finished the book,...

Branding for Nonprofits
Branding for Nonprofits
Branding for Nonprofits provides the processes, tools, and thinking needed to brand or rebrand. Author DK Holland—a pioneer in the field—helps nonprofits approach the rebranding process with confidence and enthusiasm. Case studies reveal real-life situations in which nonprofits have successfully created branding opportunities...
The Internet and Its Protocols: A Comparative Approach (The Morgan Kaufmann Series in Networking)
The Internet and Its Protocols: A Comparative Approach (The Morgan Kaufmann Series in Networking)
"Not only is this book thorough in covering the networking technologies and the applications of todays communications networks, it also guides you to comprehensive understanding of problems and solutions. This should be mandatory reading for every professional in our business."
--Loa Andersson, TLA-group, IETF MPLS working group
...
S60 Programming: A Tutorial Guide (Symbian Press)
S60 Programming: A Tutorial Guide (Symbian Press)
Based on the authors' experiences in developing and teaching Symbian OS, this practical guide is perfect for programmers and provides a series of example-based scenarios that show how to develop Symbian applications.
  • Exercises walk the reader through the initial development of a console-based card game engine to a graphical user...
STAIRS 2006:  Proceedings of the Third Starting AI Researchers' Symposium, Volume 142 Frontiers in Artificial Intelligence and Applications
STAIRS 2006: Proceedings of the Third Starting AI Researchers' Symposium, Volume 142 Frontiers in Artificial Intelligence and Applications
The field of Artificial Cognition has arisen recently with the intention of developing agents capable to perceive, explore, learn and perform reasoning about the external world. A number of machine learning approaches have been adopted in order to make agent behaviour cognitive. However, most existing systems rely on an external expert guiding the...
Practical Internet Security
Practical Internet Security
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external...
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Enterprise, Business-Process and Information Systems Modeling: 12th International Conference
Enterprise, Business-Process and Information Systems Modeling: 12th International Conference

This book contains the proceedings of two long-running events held in connection to the CAiSE conferences relating to the areas of enterprise, business-process and information systems modeling:

• The 12th International Conference on Business Process Modeling, Development and Support (BPMDS 2011) • The 16th...

VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Fedora 10 and Red Hat Enterprise Linux Bible
Fedora 10 and Red Hat Enterprise Linux Bible
As a market-leading, free, open-source Linux operating system (OS), Fedora 10 is implemented in Red Hat Enterprise Linux and serves as an excellent OS for those who want more frequent updates. Bestselling author Christopher Negus offers an ideal companion resource for both new and advanced Linux users. He presents clear, thorough instructions so...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy