|
|
|
|
AutoCAD: Secrets Every User Should KnowDiscover Powerful Techniques and Features That Most Users Overlook
Whether you're designing houses, landscapes, or machines, there are AutoCAD tricks-of-the-trade that even seasoned users don't know—tips that can improve your skills, understanding, and productivity. This practical, in-depth... | | | | Red Hat Fedora Linux SecretsLearn how to release the full potential of Red Hat Fedora Linux and install the latest release of Fedora Core (FC4) with this comprehensive guide. Within these pages, you'll be privy to valuable secrets contained in FC4: yum, up2date, mandatory access control with Security Enhanced Linux, and improved device handling with udev. You'll go behind the... |
|
Experimental and Efficient Algorithms: Third International Workshop, WEA 2004, Angra dos Reis, Brazil, May 25-28, 2004, Proceedings (Lecture Notes in Computer Science)
The Third International Workshop on Experimental and E?cient Algorithms (WEA 2004) was held in Angra dos Reis (Brazil), May 25-28, 2004. TheWEAworkshopsaresponsoredbytheEuropeanAssociationforTheo- tical Computer Science (EATCS). They are intended to provide an international forum for researchers in the areas of design, analysis, and... | | Windows XP HacksNow power users can rejoice! Windows XP Hacks offers tips, tools, and know-how to bend Windows XP to your will. The book delves into XP topics such as controlling the control panel, changing unchangeable icons, removing uninstallable XP components, stopping pop-up ads, taking a bite out of... | | Mafiaboy: How I Cracked the Internet and Why It's Still Broken
I think it's fair to say that personal computers have become the most empowering tool we've ever created. They're tools of communication, they're tools of creativity, and they can be shaped by their user.
"HOT ON THE TRAIL OF 'MAFIABOY" read a headline on technology news site Wired.com on February 15,... |
|
Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... | | Peachtree for DummiesHandle the financial parts of your business like a pro
Set up Peachtree to do what you need, and even have a backup plan
If you have a business, you have financial management needs. With Peachtreeand this book, you can manage inventory, bill customers and collect money, pay... | | SUSE Linux 9 BibleIf SUSE Linux 9 can do it, you can do it, too ...
SUSE is the oldest commercial Linux distribution, favored in Europe and rapidly gaining popularity in the United States. Whether you're just discovering Linux or switching from another distribution, this comprehensive reference gives you not only the "how-to" information, but also... |
|
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |