Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.
Developing data-centric web applications can be a real challenge as it is a multi-disciplinary process. There are many technologies involved in the client side (HTML, CSS, JavaScript, and so on); the interaction with the database, on the server side; the typeless nature of the web environment; and above all, the need to put it all together....
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The...
Each year about eight million Americans suffer the death of someone close to them. Now for thse who face the challenges of sudden death, there is a hand to hold, written by two women who have experienced sudden loss. This updated edition of the best-selling bereavement classic will touch,...
The word myth comes from the Greek word mythos, which means “story” or “speech.”1 Myth is often the word used to describe a story that explains events or objects that occur in nature, such as the creation of certain flowers or animals, the location of deserts or oceans, and even the origin and cycle of the seasons....
Create and execute cutting-edge projects using the Adobe Flash Platform!
This book explores a Flash Platform project’s life cycle, diving deep into each phase — planning, design, development, build and release, and continued maintenance.
This comprehensive guide is for your entire team to refer to...
Discover how to take advantage of the many new features in SharePoint 2010
SharePoint 2010 is a significant leap forward from the 2007 release, and 'you will find that there are a ton of features built into the platform for you to leverage in your solution development. Because SharePoint is a broad platform that covers a...
“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...
How much more effective would companies be if all the content they created for the Web reached its specific target audience? In this book, three pioneering IBM content and search experts show how to get closer to this goal than ever before. Readers will discover how to write highly relevant content containing the keywords and long-tail...
Looking ahead to retirement? Depending on your circumstances and your age, you may no longer have any margin for error. And your emotions and irrational behavior could be perpetuating a dangerous cycle of overspending and rising debt that may shatter whatever vision of retirement you still have. Welcome to the world of...
Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle.
Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic...
MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...