Home | Amazing | Today | Tags | Publishers | Years | Search 
Firefox Hacks
Firefox Hacks

Firefox Hacks is ideal for power users who want to maximize the effectiveness of Firefox, the next-generation web browser that is quickly gaining in popularity. This highly-focused book offers all the valuable tips and tools you need to enjoy a superior and safer browsing experience. Learn how...

CSS Cookbook, 2nd Edition
CSS Cookbook, 2nd Edition

As the industry standard method for enriching the presentation of HTML-based web pages, Cascading Style Sheets (CSS) allow you to give web pages more structure and a more sophisticated look. But first, you have to get past CSS theory and resolve real-world problems.

For those all-too-common dilemmas that...

Moving to Ubuntu Linux
Moving to Ubuntu Linux

Discover Ubuntu, Today’s Hottest Linux

Everyone’s talking about Ubuntu—it’s not just 100% free, it’s the most useful, practical desktop Linux ever! Now, Linux expert Marcel Gagné reveals Ubuntu’s amazing power and helps you migrate from Windows faster than you ever thought...

Understanding AJAX: Using JavaScript to Create Rich Internet Applications
Understanding AJAX: Using JavaScript to Create Rich Internet Applications

AJAX: fast mastery for experienced Web developers!

 

Already an experienced Web developer? Apply your skills in today’s fastest-growing area of Web development: AJAX!

 

...
JavaScript and Ajax for the Web, Sixth Edition (Visual QuickStart Guide)
JavaScript and Ajax for the Web, Sixth Edition (Visual QuickStart Guide)

Need to learn JavaScript fast? This best-selling reference's visual format and step-by-step, task-based instructions will have you up and running with JavaScript in no time. In this completely updated edition of our best-selling guide to JavaScript, leading Web and computing experts Tom Negrino and Dori Smith use crystal-clear...

Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Hacking del.icio.us
Hacking del.icio.us
I wrote this book with tinkerers in mind—that is to say, tinkerers of various levels of familiarity with del.icio.us in particular and Web development skill in general.Whether you’re just getting on your way to being a power user at del.icio.us, or whether you’re a hardcore Web development guru who’s running your own...
CSS Hacks and Filters: Making Cascading Stylesheets Work
CSS Hacks and Filters: Making Cascading Stylesheets Work
Here's how to make CSS work the way it should

Cascading Style Sheets, the technology meant to bring order out of chaos by letting you update Web sites effortlessly, just doesn't always work. You recognize that when you discover your graphics, perfectly positioned in Firefox, throw your page out of whack when viewed in Explorer. The solution?...

Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
CSS Instant Results (Programmer to Programmer)
CSS Instant Results (Programmer to Programmer)
With the latest generation of modern browsers expanding support for CSS 3, it is an exciting time in the CSS world. Featuring ten ready-to-use projects on the book's CD-ROM, this helpful reference dives into working code so you can rapidly master the increasingly diverse applications web designers can use with CSS, including some that previously...
PC Magazine Windows XP Security Solutions
PC Magazine Windows XP Security Solutions
Think you're safe?

Guess what?

Studies have estimated that up to 90 percent of computers are infected by some security threat or another. There's a good chance yours is among them, but any computer can be easily secured to a high level-if you know what you're doing.

They're out there. Trust PC Magazine to...

 
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy