Home | Amazing | Today | Tags | Publishers | Years | Search 
openSUSE Linux Unleashed
openSUSE Linux Unleashed
DVD Includes openSUSE 10.3

 

openSUSE Linux Unleashed presents comprehensive coverage of the community version of SUSE Linux, one of the most popular and most complete Linux distributions in the world.

 

This book...

Path-Oriented Program Analysis
Path-Oriented Program Analysis
This book presents a unique method for decomposing a computer program along its execution paths, for simplifying the subprograms so produced, and for recomposing a program from its subprograms. This method enables us to divide and conquer the complexity involved in understanding the computation performed by a program by decomposing it into a set...
Digital Audio Essentials
Digital Audio Essentials
Join the digital audio revolution! Tens of millions of users are embracing digital music, and with Digital Audio Essentials, you can, too. Nearly every personal computer built in the last few years contains a CD-burning drive; MP3 and other portable player sales dominate the consumer electronics industry; and new networkable stereo...
VB.NET Core Classes in a Nutshell
VB.NET Core Classes in a Nutshell
The .NET platform gives Visual Basic developers access to an entirely new and comprehensive class library that promises to further simplify and speed VB application development. In VB.NET Core Classes in a Nutshell, VB Programmers will find a concise and thorough reference to the types found in the core namespaces of the .NET Framework...
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used...
The CISM Prep Guide: Mastering the Five Domains of Information Security Management
The CISM Prep Guide: Mastering the Five Domains of Information Security Management

There is no better way for you to stand out from the crowd of IT professionals than to get your Certified Information Security Manager (CISM) certification from the Information Systems Audit and Control Association (ISACA). Written by the bestselling authors of the CISSP Prep Guide, this comprehensive test guide provides you with all...

Complete Flash Remoting MX
Complete Flash Remoting MX

Flash Remoting MX is one of the most exciting new technologies available for Macromedia Flash MX, and everything you need to know to use its dynamic capabilities is in this comprehensive reference guide. Flash and ActionScript expert Joey Lott gives you a thorough understanding of how Flash Remoting MX opens up new possibilities for building...

Designing Network Security (2nd Edition) (Networking Technology)
Designing Network Security (2nd Edition) (Networking Technology)
Master the design of secure networks with the updated edition of this best-selling security guide

* Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs
* Learn how to use new and legacy Cisco Systems equipment to secure your networks
* Understand how
...

Troubleshooting Microsoft Technologies: The Ultimate Administrator's Repair Manual (The Addison-Wesley Microsoft Technology Series)
Troubleshooting Microsoft Technologies: The Ultimate Administrator's Repair Manual (The Addison-Wesley Microsoft Technology Series)
Many IT professionals have long considered the practice of troubleshooting to be more of an art than a science. However, with the right methodology, anyone can systematically analyze and repair problems affecting an individual computer or an entire network. All it requires is an understanding of the technologies involved, knowledge of the available...
Ideas are Free: How the Idea Revolution is Liberating People and Transforming Organizations
Ideas are Free: How the Idea Revolution is Liberating People and Transforming Organizations

The fact is, because they’re the ones doing the day-to-day work, front-line employees see a great many problems and opportunities that their managers don’t. But most organizations do very poorly at tapping into this extraordinary potential source of revenue-enhancing and savings-generated ideas.

Drawing on extensive research...

Ethics for CPAs: Meeting Expectations in Challenging Times
Ethics for CPAs: Meeting Expectations in Challenging Times

Accountants are under attack. Recent investigations of Enron, Global Crossing, WorldCom, and Adelphia, just to name a few, along with the remarkable collapse of Arthur Andersen, have focused the nation’s attention on the accounting profession and the need for reforms. All parties agree that accounting firms must change their priorities and...

Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy