 |
|
 Using LinkedIn
Although professionals have always acknowledged the value of networking,
today’s economic climate makes developing a solid network even more critical.
LinkedIn, the leading social networking site for professionals, is the ideal tool for
maximizing the potential of an online network. LinkedIn currently has more than
65 million... |  |  Introduction to Cryptography
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security... |  |  iOS 4 in Action: Examples and Solutions for iPhone & iPad
When I started playing with the first-generation iPhone back in 2008, I was amazed by
the simplicity and versatility of the smart phone. With the iPhone in hand, I could
take pictures, navigate with GPS, tell time, and of course, play games—especially when
I was bored while waiting in line at the DMV for my license plate.... |
|
|
 Supercharged JavaScript Graphics: with HTML5 canvas, jQuery, and More
With HTML5 and improved web browser support, JavaScript has become the tool of choice for creating high-performance web graphics. This faced-paced book shows you how to use JavaScript, jQuery, DHTML, and HTML5's Canvas element to create rich web applications for computers and mobile devices.
By following real-world... |  |  Apple Training Series: iMovie ’11
Welcome to the official Apple training course for iMovie ’11, with
bonus lessons on iWeb and iDVD. You don’t need to have any special
background to get started, other than having a Mac (and perhaps a
healthy curiosity about what you can do with it).
This ebook comprises the entire iMovie section of Apple Training... |  |  Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Information security has become a critical component in the stability and progress
of the modern world. With high expectations from the public and stringent regulations
from legislative and industry bodies, never have the pressures on corporations,
governments and other organizations been so great to protect their own data as well
as... |
|
 Rigorous Software Development: An Introduction to Program Verification
This book is about the use of techniques and tools for the design and implementation
of computer systems and software that are free from logical or functional flaws
(in the sense of functional requirements). The word rigorous in the title of this book
is justified by the fact that the arguments for such fault freeness have their roots... |  |  The Definitive Guide to Drupal 7
Drupal is a great content management system, a powerful framework for web applications, and a cutting
edge social publishing platform. Above all, Drupal is more than software—it is a vibrant community of
developers, designers, project managers, business innovators, technology strategists, user experience
professionals, standards... |  |  Apple Training Series: iPhoto ’11
Welcome to the official Apple training course for the iPhoto ’11, with
bonus lessons on iWeb and iDVD. You don’t need to have any special
background to get started, other than having a Mac (and perhaps a
healthy curiosity about what you can do with it).
This ebook comprises the entire iPhoto section of Apple... |
|
Result Page: 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 |