ASP.NET Cookbook This new book provides a wealth of solutions to problems commonly encountered when developing ASP.NET web applications in the popular problem-solution-discussion Cookbook format. For every problem, there's a worked-out solution or recipe a short, focused piece of code that web developers can insert directly into their applications. This... Graphics Tablet Solutions Containing 320 pages of vivid, full-color examples, "Graphic Tablet Solutions" is the first book to address graphics tablets, bringing new freedom to its users through the book's simple format and comprehensive topics. This book teaches users to choose, install, customize and optimize the hardware for their design needs. It covers how to... Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
Trust-Based Selling: Finding and Keeping Customers for Life
The first year of developing a new sales territory or establishing new customers is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on products, grab a customer list, start calling for appointments, discover opportunities, and close deals. In...
Flash 5 Bible "The must-have book for all Flash developers!"
—James Baker, Creative Director, the wddg
"The Flash 5 Bible is the book to have."
—Todd Purgason, Creative Director, Juxt Interactive
If Flash 5 can do it, you can do it too...
Whether you're a Web-development...
Perfect Passwords: Selection, Protection, Authentication User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According...
|Result Page: 10 9 8 7 6 5 4 3 2 1 |