This book contains everything you need to NEED to know about your credit, even if it is excellent. Good credit is sexy covers topics such as identity theft, getting rid of junk mail, getting a mortgage or auto lease, and of course, how to fix your credit......
Do you carry around a pocket full of cash, telling your friends that cash is...
One day a couple of years ago, I was stunned when my son told me, "Dad, my JAR snapshot messed up the configuration." As a curious dad and an experienced Java programmer, my question to him was, "How do you know what a JAR is?"
What I didn't anticipate at that time was how that one question would...
Teaches you to start up Nginx and quickly take your expertise to a level where you can comfortably work with various aspects of the web server and make informed design decisions for your web farm. Nginx powers more than 40% of the top 1000 websites and is among the handful of web servers that can handle more than 10K simultaneous connections....
Practical TCP/IP is the only book you need to ensure that your networks work. With this book you learn by doing as well as reading. Split into 4 Parts, this book has a unique modular approach that facilitates in-depth and easy learning. The detailed appendices make this a desktop book you cannot be without.
You wanted more Windows XP solutions. Here they are
PC Magazine's Neil Randall heard you when you asked for more about Windows XP security, fighting spy- ware, and surviving a crash. This second edition includes more than 100 pages of new information about protecting your system, preventing problems, and rescuing data if something...
The practice of building software is a “new kid on the block” technology. Though it may not seem this way for those who have been in the field for most of their careers, in the overall scheme of professions, software builders are relative “newbies.”
In the short history of the software field, a lot of facts have...
Any organization that has a searchable web site or intranet is sitting on top of hugely valuable and usually under-exploited data: logs that capture what users are searching for, how often each query was searched, and how many results each query retrieved. Search queries are gold: they are real data that show us exactly what users are...
Information Systems and Technology, this could mean an incident that completely destroys data, slows down productivity, or causes any other major interruption to your operations or your business. How bad can it get?—"Most large companies spend between 2% and 4% of their IT budget on disaster recovery planning; this is intended to avoid...
Welcome to Microsoft Visual Studio 2008 Programming. This is a book about doing software development with Microsoft’s latest development studio—Visual Studio 2008. All code samples in the book were built with either Visual Studio 2008 Professional or Visual Studio Team System 2008....
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are...