Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using the Internet Safely For Seniors For Dummies (Computer/Tech)
Using the Internet Safely For Seniors For Dummies (Computer/Tech)
The Internet is amazing, but the risks you’ve heard about are real, too. You can avoid being a victim of online crime with the simple steps for staying safe online that you’ll find in Using the Internet Safely For Seniors For Dummies.

Here’s the guide you need to steer safely through the hazards so you can shop,...

Incredible iPhone Apps For Dummies
Incredible iPhone Apps For Dummies

A full-color directory of must-have iPhone and iPod touch apps!

The App Store allows you to browse and download thousands of applications that were developed with the iPhone SDK and published through Apple. The popularity of iPhone and iPod touch apps is exploding and this handy guide helps you sort through the tens of...

Google Analytics
Google Analytics

Do you know what people do when they visit your website or web app? Or how much the site contributes to your bottom line? Google Analytics keeps track and makes it easy for you to learn precisely what's happening. This hands-on guide shows you how to get the most out of this free and powerful tool -- whether you're new to...

MAKE: Electronics: Learning Through Discovery
MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the...
Microsoft Windows PowerShell 3.0 Firstlook
Microsoft Windows PowerShell 3.0 Firstlook
With PowerShell quickly becoming the de-facto standard for automation, on the Windows platform, it is becoming a necessity to learn and understand the language. Microsoft Windows PowerShell 3.0 First Look will ensure that you have a great overview of the numerous new features and changes found in the most recent version of the...
Pro Tools HD: Advanced Techniques and Workflows
Pro Tools HD: Advanced Techniques and Workflows

Learn how to make the most of Pro Tools HD 11

Overview

  • Create optimum quality audio using powerful tools of Pro Tools HD
  • Learn how to enhance workflow and creative outputs for recording, editing in music production, film scoring and television post production
  • Step-by-step...
Raspberry Pi Gaming Second Edition
Raspberry Pi Gaming Second Edition

Design, create, and play all kinds of video games on your Raspberry Pi computer

About This Book

  • Program your very own video game on the Raspberry Pi using the Scratch programming language
  • Install and manage your Raspberry Pi
  • Set up your Raspberry Pi to play hundreds of...
Beginning Django: Web Application Development and Deployment with Python
Beginning Django: Web Application Development and Deployment with Python
Discover the Django web application framework and get started building Python-based web applications. This book takes you from the basics of Django all the way through to cutting-edge topics such as creating RESTful applications. Beginning Django also covers ancillary, but essential, development topics, including...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Software Testing Fundamentals : Methods and Metrics
Software Testing Fundamentals : Methods and Metrics

Software testing expert Marnie Hutcheson explains both the theory and the practical application of her down-to-earth approach to risk-based testing, the Most Important Tests (MITs) method. The many proven tools, methods, and metrics examined can be used to ensure that you always have reliable, functional software and systems. Software...

Color Management for Digital Photographers For Dummies (Computer/Tech)
Color Management for Digital Photographers For Dummies (Computer/Tech)
Here's your key to perfect color in digital images

Fine-tune brightness, contrast, and tone with Photoshop® Elements and these tips

Shooting great photos is only half the battle—tweaking the details in your digital darkroom makes the difference between so-so images and...

unlimited object storage image
Result Page: 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy