|
|
|
|
|
Practical SharePoint 2010 Information Architecture
Practical SharePoint 2010 Information Architecture is a guide and tool set for planning and documenting the scope, navigational taxonomy, document taxonomy, metadata, page layouts and workflows for a successful SharePoint 2010 project. If you have been tasked with delivering an intranet for collaboration, document management or as a... | | Practical Haskell: A Real World Guide to Programming
Get a practical, hands-on introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. This book contains excellent coverage of the Haskell ecosystem and supporting tools, include Cabal and Stack for managing projects,... | | Photoshop CS4 Down & Dirty TricksUNLOCK THE SECRETS OF THE HOTTEST TRICKS, AND MOST REQUESTED PHOTOSHOP EFFECTS IN ONE AMAZING BOOK!
Scott Kelby, co-host of Photoshop User TV and the world’s #1 bestselling Photoshop author, is back to unlock the secrets of an amazing new collection of the latest eye-popping, jaw-dropping, Photoshop special... |
|
|
The Gathering Storm (Wheel of Time, Book 12)
Tarmon Gai’don, the Last Battle, looms. And mankind is not ready.
The final volume of the Wheel of Time, A Memory of Light, was partially written by Robert Jordan before his untimely passing in 2007. Brandon Sanderson, New York Times bestselling author of the Mistborn books, was... | | The Gods that Failed: How Blind Faith in Markets Has Cost Us Our Future
Over the past three decades, governments have ceded economic control to a new elite of free-market operatives and their colleagues in national and international institutions like the IMF, the World Bank, and the World Trade Organization. They promised economic stability but have delivered chaos. Their speculation has left the global economy ... | | Python Penetration Testing Essentials
Employ the power of Python to get the best out of pentesting
About This Book
-
Learn to detect and avoid various types of attacks that put the privacy of a system at risk
-
Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |