Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking Vim 7.2
Hacking Vim 7.2

Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.

This book contains examples that cover...

Oracle Application Express 3.2: The Essentials and More
Oracle Application Express 3.2: The Essentials and More

Developing data-centric web applications can be a real challenge as it is a multi-disciplinary process. There are many technologies involved in the client side (HTML, CSS, JavaScript, and so on); the interaction with the database, on the server side; the typeless nature of the web environment; and above all, the need to put it all together....

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The...

I Wasn't Ready to Say Goodbye: Surviving, Coping and Healing After the Sudden Death of a Loved One
I Wasn't Ready to Say Goodbye: Surviving, Coping and Healing After the Sudden Death of a Loved One

Now there is a hand to hold...

Each year about eight million Americans suffer the death of someone close to them. Now for thse who face the challenges of sudden death, there is a hand to hold, written by two women who have experienced sudden loss. This updated edition of the best-selling bereavement classic will touch,...

Gods and Goddesses in Greek Mythology
Gods and Goddesses in Greek Mythology

The word myth comes from the Greek word mythos, which means “story” or “speech.”1 Myth is often the word used to describe a story that explains events or objects that occur in nature, such as the creation of certain flowers or animals, the location of deserts or oceans, and even the origin and cycle of the seasons....

Adobe Flash Platform from Start to Finish: Working Collaboratively Using Adobe Creative Suite 5
Adobe Flash Platform from Start to Finish: Working Collaboratively Using Adobe Creative Suite 5

Create and execute cutting-edge projects using the Adobe Flash Platform!

This book explores a Flash Platform project’s life cycle, diving deep into each phase — planning, design, development, build and release, and continued maintenance.

This comprehensive guide is for your entire team to refer to
...

Beginning SharePoint 2010 Development (Wrox Beginning Guides)
Beginning SharePoint 2010 Development (Wrox Beginning Guides)

Discover how to take advantage of the many new features in SharePoint 2010

SharePoint 2010 is a significant leap forward from the 2007 release, and 'you will find that there are a ton of features built into the platform for you to leverage in your solution development. Because SharePoint is a broad platform that covers a...

The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

Audience, Relevance, and Search: Targeting Web Audiences with Relevant Content
Audience, Relevance, and Search: Targeting Web Audiences with Relevant Content

How much more effective would companies be if all the content they created for the Web reached its specific target audience? In this book, three pioneering IBM content and search experts show how to get closer to this goal than ever before. Readers will discover how to write highly relevant content containing the keywords and long-tail...

Retirementology: Rethinking the American Dream in a New Economy
Retirementology: Rethinking the American Dream in a New Economy

Looking ahead to retirement? Depending on your circumstances and your age, you may no longer have any margin for error. And your emotions and irrational behavior could be perpetuating a dangerous cycle of overspending and rising debt that may shatter whatever vision of retirement you still have. Welcome to the world of...

Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle.

Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy