Home | Amazing | Today | Tags | Publishers | Years | Search 
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Sams Teach Yourself Macromedia Flash MX 2004 in 24 Hours
Sams Teach Yourself Macromedia Flash MX 2004 in 24 Hours
Since its introduction in 1996, Macromedia Flash has become the standard for delivering high impact, vector-based graphics to the Web. Flash is deceptively simple at first, yet has great depth and flexibility.Sams Teach Yourself Macromedia Flash 5 in 24 Hours offers a clearly written, well-organized introduction to this powerful product, and gives...
101 Tax Secrets for Canadians 2007: Smart Strategies That Can Save You Thousands
101 Tax Secrets for Canadians 2007: Smart Strategies That Can Save You Thousands

KEEP MORE MONEY IN YOUR POCKET AT TAX TIME AND SEND LESS OF IT TO THE GOVERNMENT.

Canadians love to hate taxes. For many, the biggest expense they face every year is their tax bill, and complaining about a huge tax bill is something of a national sport. But most Canadians have done little or nothing to reduce the income tax they...

Cost-Justifying Usability, Second Edition: An Update for the Internet Age, Second Edition (Interactive Technologies)
Cost-Justifying Usability, Second Edition: An Update for the Internet Age, Second Edition (Interactive Technologies)
HCI professionals will repeat quotes with statistics, learn from case studies, and copy chapters for their managers. Thorough & thoughtful, practical & actionable-- readers will be able to put the ideas to work immediately!

Ben Shneiderman, University of Maryland

"Cost-Justifying Usability" delivers much
...
Unix Unleashed/Book and CD
Unix Unleashed/Book and CD
Given life by Turing Award winning Bell Labs computer scientist Ken Thompson at Murray Hill, N.J., in August 1969, UNIX spent its early years as a research curiosity. When I met up with Unix in the summer of '82, however, it already possessed the one characteristic that destined it to dominate a major chunk of the world's market for operating...
E-government Research: Policy and Management
E-government Research: Policy and Management
Virtual technology is increasingly prevalent in all spheres of daily life, including infiltration into governmental policies, processes, infrastructures, and frameworks. E-Government Research: Policy and Management provides scholars and practitioners with a critical mass of research on the integration, management, implications,...
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
The simulation of social behavior in a variety of domains is an increasingly important technological tool.

eference survey of social simulation work, Social Simulation: Technologies, Advances and New Discoveries comprehensively collects the most exciting developments in the field. Drawing research contributions from a vibrant...

GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
Online Newsgathering: Research and Reporting for Journalism
Online Newsgathering: Research and Reporting for Journalism
Journalists used to rely on their notepad and pen. Today, professional journalists rely on the computerand not just for the writing. Much, if not all, of a journalists research happens on a computer.

If you are journalist of any kind, you need to know how to find the information you need online. This book will show you how to find
...
Java Connector Architecture: Building Enterprise Adaptors (Kaleidoscope)
Java Connector Architecture: Building Enterprise Adaptors (Kaleidoscope)
Java Connector Architecture (JCA) presents the JCA and identifies the scope in which a JCA-based adapter operates. The book quickly moves to the design methodologies employed in adapter using the JCA. The book then progresses to information about testing and deploying adapters in a production environment. Java Connector Architecture defines a...
Advances in Object-Oriented Data Modeling (Cooperative Information Systems)
Advances in Object-Oriented Data Modeling (Cooperative Information Systems)
This book focuses on recent developments in representational and processing aspects of complex data-intensive applications.

Focuses on recent developments in representational and processing aspects of object-oriented data modeling, covering hot topics such as reverse engineering and work-flow modeling. Each chapter contains a
...
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
"It is easy to write books that address broad topics and ideas leaving the reader with the question Yes, but how? By combining a comprehensive guide to data preparation for data mining along with specific examples in SAS, Mamdouh's book is a rare finda blend of theory and the practical at the same time. As anyone who has mined data will...
Result Page: 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy