 |
|
 Microsoft Windows Home Server Unleashed (2nd Edition)
This is the most comprehensive, practical, and useful guide to Windows Home Server, including Microsoft’s major updates in PowerPacks 1, 2, and 3. Top Windows expert Paul McFedries brings together tips, techniques, and shortcuts available nowhere else and presents them all in plain English for every Windows Home... |  |  Adobe Captivate 4: The Definitive Guide
Adobe Captivate 4: The Definitive Guide, the follow-up to Wordware s popular Adobe Captivate 3: The Definitive Guide, steps you through all the procedures needed to create Flash movies based on any software on your desktop. You ll learn how to create Flash movies, edit individual screens, add and edit sound, even add interactivity (with or... |  |  Adobe Captivate 3: The Definitive Guide (Wordware Applications Library)
Adobe Captivate 3: The Definitive Guide, the follow-up to Wordware s popular Macromedia Captivate: The Definitive Guide, steps you through all the procedures needed to create Flash movies based on any software on your desktop. You ll learn how to create Flash movies, edit individual screens, add and edit sound, even add interactivity (with or... |
|
 Configuring SAP ERP Sales and Distribution
This book provides a deep, working understanding of the essential concepts and customization settings related to the SAP Sales and Distribution (SD) application. SD is one of the most popular modules of the SAP ERP software and indeed the most interesting one to implement.
Over the years, we have worked on a variety of projects... |  |  Mastering Joomla! 1.5 Extension and Framework Development
Joomla! is one of the world's top open source content management systems, which enables you to build websites and powerful online applications. Out of the box, Joomla! does a great job of managing the content needed to enhance the functionality of your website. But for many people, the true power of Joomla! lies in its application... |  |  Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn... |
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |