Home | Amazing | Today | Tags | Publishers | Years | Search 
Integrating PHP with Windows
Integrating PHP with Windows

PHP has changed the world: no other language has influenced and spurred web development so strongly. From simple home pages to social software and business applications to the largest global websites, PHP has played a leading role for years. Simultaneously, Microsoft and its Windows operating system has made computers available to all...

Google Script: Enterprise Application Essentials: Adding Functionality to Your Google Apps
Google Script: Enterprise Application Essentials: Adding Functionality to Your Google Apps

If you are reading this book, there is a good chance you have heard of Google and its powerful office productivity suite, Google Apps. Google offers search, email, word processing, and hundreds of other cloud applications and services that can be available to the individual and can scale all the way up to massive corporations and...

Exim: The Mail Transfer Agent
Exim: The Mail Transfer Agent
Back in 1995, the central computing services at Cambridge University were running a variety of mail transfer agents, including Sendmail, Smail 3, and PP. Some years before, I had converted the systems whose mail I managed from Sendmail to Smail to make it easier to handle the special requir ements of the early 1990s...
Easy Mac OS X Lion (2nd Edition)
Easy Mac OS X Lion (2nd Edition)

SEE IT DONE. DO IT YOURSELF. It’s that Easy! Easy Mac OS X Lion teaches you the fundamentals of working with the Mac operating system as well as how to use many of the applications that come with your Mac. Fully illustrated steps with simple instructions guide you through each task, building the...

Emerging Wireless Technologies and the Future Mobile Internet
Emerging Wireless Technologies and the Future Mobile Internet
The current Internet is an outgrowth of the ARPANET (Advanced Research Projects Agency Network) that was initiated four decades ago. The TCP/IP (Transmission Control Protocol/Internet Protocol) designed by Vinton Cerf and Robert Kahn in 1973 did not anticipate, quite understandably, such extensive use of wireless channels and...
Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
Pro Visual Studio LightSwitch 2011 Development (Professional Apress)
Pro Visual Studio LightSwitch 2011 Development (Professional Apress)
We’ve designed this book to show you how to write professional applications using Microsoft LightSwitch.

As software developers, we understand how difficult it is to develop software in real life. End users expect their applications to be reliable, functional, and polished. They’ll also have preferences in
...
Sams Teach Yourself TCP/IP in 24 Hours (5th Edition) (Sams Teach Yourself -- Hours)
Sams Teach Yourself TCP/IP in 24 Hours (5th Edition) (Sams Teach Yourself -- Hours)

 

Welcome to Sams Teach Yourself TCP/IP in 24 Hours, Fifth Edition. This book provides a clear and concise introduction to TCP/IP for newcomers, and also for users who have worked with TCP/IP but would like a little more of the inside story. Unlike other networking primers that point and click
...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy