Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
My New iPad: A User's Guide
My New iPad: A User's Guide

The iPad is cute. It's lovable. It's fun to play with. And it's a bit mysterious.

My New iPad is your guide to getting more from your new iPad, Apple's latest magical creation. You'll learn how to do the things you want to do right now—like surf the Internet, send email, listen to music,...

Communicating with Email and the Internet: Learning Made Simple
Communicating with Email and the Internet: Learning Made Simple
This handy textbook covers all you will need to know to learn to communicate using email and the internet.

Learning Made Simple books give readers skills without frills. They are matched to the main qualifications, in this case ECDL, ICDL and CLAIT, and written by experienced teachers and authors to make often tricky subjects simple to
...
Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

My iPhone (covers 3G, 3Gs and 4 running iOS4) (4th Edition)
My iPhone (covers 3G, 3Gs and 4 running iOS4) (4th Edition)

Step-by-step instructions with callouts to iPhone images that show you exactly what to do.

 

Help when you run into iPhone problems or limitations.

 

Tips and Notes...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Data Scientists at Work
Data Scientists at Work

Data Scientists at Work is a collection of interviews with sixteen of the world's most influential and innovative data scientists from across the spectrum of this hot new profession. "Data scientist is the sexiest job in the 21st century," according to the Harvard Business Review. By 2018, the United States will...

sendmail Performance Tuning
sendmail Performance Tuning

"This book is great. Nick covers a wide range of materials--everything from how to architect the mail system and what disks to buy to how to configure your router. This book should be a basic reference for anyone who needs to get down into the guts of a sendmail-based system and make it shine."-Eric Allman, the...

HTML: A Beginner's Guide, Second Edition
HTML: A Beginner's Guide, Second Edition

Essential Skills--Made Easy!

Peel back the Web's opulent exterior and see how HTML makes it all look so great. Author Wendy Willard will help you understand HTML with clear lessons delivered in a proven learning system. In dedicated modules that act as stand-alone lessons, you'll discover how to structure a page, place images, size text,...

Laptops For Dummies (Computer/Tech)
Laptops For Dummies (Computer/Tech)
Laptops For Dummies, 3rd Edition shows you how to use your laptop to its fullest potential, from how to purchase a laptop and what to do when you first open the box to how to keep your laptop safe and running smoothly.

You will discover how to choose and purchase the right laptop for you, how to set up and maintain your laptop,...

It's Your World, So Change It: Using the Power of the Internet to Create Social Change
It's Your World, So Change It: Using the Power of the Internet to Create Social Change

There's been plenty of hype about the "netroots," and online activism on both the right and left. But most of it's been celebratory, not practical. This is a practical, start to finish guide to promoting any cause and participating in any social movement on the social Web. Long-time activist and online community expert Tom...

How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy