 |
|
 Strategies for eCommerce SuccessWith electronic commerce growing so rapidly, businesses need to examine critical elements that could influence users' perceptions of business-to-business and business-to-consumer electronic commerce. This book presents a study of key components and concepts of e-commerce, evaluates the critical success factors for global e-commerce, the economics... |  |  Mastering UnixAll Your Unix Questions—Answered!
Mastering Unix is your source for everything you need to know about today’s most influential operating system. Inside, two Unix experts provide essential information on a wide range of Unix flavors, concentrating on Linux, FreeBSD, and Solaris8. Whether you’re... |  |  Mastering Red Hat Linux 7Join the Red Hat Revolution! Newly revised and updated, Mastering Red Hat Linux is the essential guide to the world's leading Linux distribution. Inside, you'll find everything you need to know to install, configure, use, and optimize Red Hat Linux. You'll even find the operating system itself-the Publisher's Edition of Red Hat Linux 7.1,... |
|
 |  |  Mastering Mac OS X, Third EditionCovers OS X v.10.3, Panther!
On the Prowl for In-Depth, Step-by-Step, Mac OS X Coverage? Your Search Is Over
Whether you're new to the Mac, upgrading from a previous Mac OS version, or converting from Windows or Unix, Mastering Mac OS X, Third Edition is your one-stop resource for... |  |  iMac For Dummies (Computer/Tech)Congratulations! When you bought that shiny new anodized aluminum iMac, you made a great choice. Now you want take advantage and control of that baby's awesome speed, high performance, powerful operating system, and fantastic applications, and iMac for Dummies, 5th Edition is here to help you do just that!
This easy-to-use guide... |
|
|
 Security and Software for Cybercafes (Premier Reference Source)Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information,... |  |  Basics of Contemporary Cryptography for IT PractitionersThe aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques... |  |  Linux Security: Craig Hunt Linux LibraryAuthoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators
This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the... |
|
| Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 |