Home | Amazing | Today | Tags | Publishers | Years | Search 
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Core Python Programming (2nd Edition)
Core Python Programming (2nd Edition)
A quick guide to everything anyone would want to know about the soaringly popular Internet programming language, Python. Provides an introduction to new features introduced in Python 1.6, and topics covered include regular expressions, extending Python, and OOP. The CD-ROM includes the source code for all of the examples in the text. Softcover....
30 Days to a More Powerful Memory
30 Days to a More Powerful Memory
Everyone wants a better memory—and in today’s information-filled, multitasking age, having a good memory is more important than ever. Whether you need to keep track of your e-mail messages, impress the boss, give a speech, organize a busy social schedule, remember whom you met where and when, or anything else, a good memory is a...
Emerging Technologies of Text Mining: Techniques and Applications
Emerging Technologies of Text Mining: Techniques and Applications
All around modern society, an enormous amount of strategic information is spread in many different presentation forms, like e-mail, formal and informal documents, historical reports, personal notes, Web pages, and so on. The access and transformation of this information in knowledge as a basis for decision making in the corporate world have become...
Beginning Rails: From Novice to Professional
Beginning Rails: From Novice to Professional
Beginning Rails is the practical starting point for anyone wanting to learn how to build dynamic web applications using the Rails framework for Ruby. You’ll learn how all of the components of Rails fit together and how you can leverage them to create sophisticated web applications with less code and more joy.

This book is...

Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used...
Complete Flash Remoting MX
Complete Flash Remoting MX

Flash Remoting MX is one of the most exciting new technologies available for Macromedia Flash MX, and everything you need to know to use its dynamic capabilities is in this comprehensive reference guide. Flash and ActionScript expert Joey Lott gives you a thorough understanding of how Flash Remoting MX opens up new possibilities for building...

Microsoft Office XP Inside Out
Microsoft Office XP Inside Out

This book is written for the power user, the software enthusiast, the consultant, the solutions developer, or the company guru—the one others come to for help. It's designed for the person who wants to learn the essentials quickly and then go on to more interesting topics—advanced timesaving techniques, bug workarounds,...

Microsoft Windows Server 2003 Administrator's Companion
Microsoft Windows Server 2003 Administrator's Companion

Get your mission-critical systems up and running quickly—and maximize your organization’s productivity—with the essential guide to installing, configuring, and managing the Windows Server 2003 family. This comprehensive administrator’s reference details operating system features and capabilities and provides...

Public Key Cryptography  PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
Public Key Cryptography PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
These are the Proceedings of the 11th International Workshop on Practice and Theory in Public Key Cryptography – PKC 2008. The workshop was held in Barcelona, Spain, March 9–12, 2008.

It was sponsored by the International Association for Cryptologic Research (IACR; see www.iacr.org), this year in cooperation with MAK, the
...
Practical Reporting with Ruby and Rails (Expert's Voice in Open Source)
Practical Reporting with Ruby and Rails (Expert's Voice in Open Source)
This book is about general and scalable ways to create reports with Ruby. It covers using a huge array of tools—Rails, Gruff, Ghostscript, and many more—but a common thread links them all: they are powerful tools that will serve you even if you have a huge amount of data. Using the reporting tools and techniques described in this book,...
Mac OS X Leopard Just the Steps For Dummies (Computer/Tech)
Mac OS X Leopard Just the Steps For Dummies (Computer/Tech)
Mac users have always been a loyal group, and for good reasons. Since Apple first started producing Macintosh computers in the 1980s, they’ve placed an emphasis on quality, ease-of-use, and stability. Modern Macs running the latest OS X operating system are among the most powerful and dependable personal computers you can buy, and...
Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy