Home | Amazing | Today | Tags | Publishers | Years | Search 
Using LinkedIn
Using LinkedIn

Although professionals have always acknowledged the value of networking, today’s economic climate makes developing a solid network even more critical. LinkedIn, the leading social networking site for professionals, is the ideal tool for maximizing the potential of an online network. LinkedIn currently has more than 65 million...

Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

iOS 4 in Action: Examples and Solutions for iPhone & iPad
iOS 4 in Action: Examples and Solutions for iPhone & iPad

When I started playing with the first-generation iPhone back in 2008, I was amazed by the simplicity and versatility of the smart phone. With the iPhone in hand, I could take pictures, navigate with GPS, tell time, and of course, play games—especially when I was bored while waiting in line at the DMV for my license plate....

Microsoft Exchange 2010 PowerShell Cookbook
Microsoft Exchange 2010 PowerShell Cookbook

The book is full of immediately-usable task-based recipes for managing and maintaining your Microsoft Exchange 2010 environment with Windows PowerShell 2.0 and the Exchange Management Shell. The focus of this book is to show you how to automate routine tasks and solve common problems. While the Exchange Management Shell provides hundreds of...

Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

Supercharged JavaScript Graphics: with HTML5 canvas, jQuery, and More
Supercharged JavaScript Graphics: with HTML5 canvas, jQuery, and More

With HTML5 and improved web browser support, JavaScript has become the tool of choice for creating high-performance web graphics. This faced-paced book shows you how to use JavaScript, jQuery, DHTML, and HTML5's Canvas element to create rich web applications for computers and mobile devices.

By following real-world...

Apple Training Series: iMovie ’11
Apple Training Series: iMovie ’11

Welcome to the official Apple training course for iMovie ’11, with bonus lessons on iWeb and iDVD. You don’t need to have any special background to get started, other than having a Mac (and perhaps a healthy curiosity about what you can do with it).

This ebook comprises the entire iMovie section of Apple Training...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Rigorous Software Development: An Introduction to Program Verification
Rigorous Software Development: An Introduction to Program Verification

This book is about the use of techniques and tools for the design and implementation of computer systems and software that are free from logical or functional flaws (in the sense of functional requirements). The word rigorous in the title of this book is justified by the fact that the arguments for such fault freeness have their roots...

The Definitive Guide to Drupal 7
The Definitive Guide to Drupal 7

Drupal is a great content management system, a powerful framework for web applications, and a cutting edge social publishing platform. Above all, Drupal is more than software—it is a vibrant community of developers, designers, project managers, business innovators, technology strategists, user experience professionals, standards...

Apple Training Series: iPhoto ’11
Apple Training Series: iPhoto ’11

Welcome to the official Apple training course for the iPhoto ’11, with bonus lessons on iWeb and iDVD. You don’t need to have any special background to get started, other than having a Mac (and perhaps a healthy curiosity about what you can do with it).

This ebook comprises the entire iPhoto section of Apple...

Result Page: 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy