Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Droid Pocket Guide
The Droid Pocket Guide

In this handy new Pocket Guide, mobile device expert Jason O'Grady reveals the secrets to using the DROID. He covers everything from how to make phone calls, send text messages and email to synching  data with your Google account. In addition he covers how to surf the web with the built-in browser, use the phone's GPS, Google...

LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell

Linux deployment continues to increase, and so does the demand for qualified and certified Linux system administrators. If you're seeking a job-based certification from the Linux Professional Institute (LPI), this updated guide will help you prepare for the technically challenging LPIC Level 1 Exams 101 and 102.

The...

Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and...

Click!: The No Nonsense Guide to Digital Cameras
Click!: The No Nonsense Guide to Digital Cameras
Because Technology Should Improve Your Life, Not Complicate It

No Nonsense Guides are here. With a plainspoken approach, these books are inexpensive starters that are light on idle chat and heavy on practical advice. They're lean and mean and stripped down to fighting weight, so you'll get from point A to point Z with instruction...

Introduction to Embedded Systems: A Cyber-Physical Systems Approach
Introduction to Embedded Systems: A Cyber-Physical Systems Approach

The most visible use of computers and software is processing information for human consumption. We use them to write books (like this one), search for information on the web, communicate via email, and keep track of financial data. The vast majority of computers in use, however, are much less visible. They run the engine, brakes,...

Programming Web Services with SOAP
Programming Web Services with SOAP
Programming Web Services with SOAP introduces you to building distributed Wb-based
applications using the SOAP, WSDL, and UDI protocols. You'll learn the XML underlying
these standards, as well as how to use the popular toolkits for Java and Perl. The book also
addresses security and other enterprise issues.

You'd be
...
The Modern RPG IV Language, 3rd Edition
The Modern RPG IV Language, 3rd Edition

The Modern RPG IV Language has been a best-seller ever since its first edition was published in 1988. Then it was simply The Modern RPG Language, but like the language itself, the book has grown and expanded over the years as new features and function have been added to RPG. It has become the comprehensive text used by tens of...

ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
The Nexus One Pocket Guide
The Nexus One Pocket Guide

In this handy new Pocket Guide, mobile device expert Jason O'Grady reveals the secrets to using Google's Nexus One smartphone. All of the common features are covered including Web browsing, Google Apps, IM/text/email, digital camera, video, music player, and more. With this essential companion readers will be mastering their Nexus One...

Spinning Up ServiceNow: IT Service Managers' Guide to Successful User Adoption
Spinning Up ServiceNow: IT Service Managers' Guide to Successful User Adoption
"Once in a while you come across a book you know was written from experience. Spinning Up ServiceNow  is one of those... The first part of the book should be mandatory reading for every ITSM professional regardless of the tool they work with."...
Don't Get Burned on EBay: How to Avoid Scams and Escape Bad Deals
Don't Get Burned on EBay: How to Avoid Scams and Escape Bad Deals

Lots of books tell you how to buy and sell on eBay. But what if something goes horribly awry? Do you have to chalk it up to a "lesson learned," lick your wounds and move on? Not a chance. Don't Get Burned on eBay offers relevant lessons based on real-life stories posted on eBay's Answer...

RSS and Atom in Action: Web 2.0 Building Blocks
RSS and Atom in Action: Web 2.0 Building Blocks

RSS and Atom in Action is organized into two parts. The first part introduces the blog technologies of news feed formats and publishing protocols-the building blocks. The second part shows how to put to those blocks together to assemble interesting and useful blog applications. In keeping with the behind Manning's "In...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy