 |
|
 The Facebook Marketing Book
Originally a network for select college students, Facebook first expanded into high schools, then larger networks, collecting students and colleagues across the country and, eventually, the world. Now you can not only identify your romantic partner and growing circle of friends, but also your parents and siblings. Your mom is on... |  |  Strategic Information Security
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies.... |  |  Illustrated C# 2010 (Expert's Voice in .NET)
This book presents the C# language in a uniquely succinct and visual format. Often in programming books, the information can be hidden in a vast sea of words. As a programmer who has over the years used a dozen programming languages, the author understands it can sometimes be difficult to slog through another 1,000-page book of... |
|
 Sams Teach Yourself SharePoint Foundation 2010 in 24 Hours
In just 24 sessions of one hour or less, you’ll learn how to create great websites, collaboration and content management applications, and social solutions with SharePoint Foundation 2010! Using this book’s straightforward, step-by-step approach, you’ll learn how to build, administer, and secure solutions... |  |  Internet & World Wide Web: How to Program (4th Edition)
Welcome to Internet and web programming and Internet & WorldWide Web How to Program,
Fourth Edition! At Deitel & Associates, we write programming language textbooks
and professional books for Prentice Hall, deliver corporate training worldwide and develop
Web 2.0 Internet businesses. The book has been... |  |  Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
|
Result Page: 283 282 281 280 279 278 277 276 275 274 273 272 271 270 269 268 267 266 265 |