Home | Amazing | Today | Tags | Publishers | Years | Search 
PC Magazine - 21 August 2007
PC Magazine - 21 August 2007
First Looks
GoToMeeting v3.0
GuardedID 1.02
Howard Verity TW3
Kodak EasyShare 5300 All-In-One printer
Logitech X-240
MSI Q677 Crystal Edition
Nokia E61i
Oki Printing Solutions C6000n
Panasonic Lumix DMC-FZ8
RealPlayer 11 (beta)
Sennheiser PXC 450 NoiseGard
Sony VAIO VGN-SZ370P
Adobe
...
Make Projects: Small Form Factor PCs
Make Projects: Small Form Factor PCs
Shoebox sized and smaller, small form factor PCs can pack as much computing muscle as anything from a PDA to a full-sized desktop computer. They consume less power, have few or no moving parts, and are very quiet. Whether you plan to use one as a standalone PC or want to embed it in your next hacking project, a small form factor PC may be the next...
Big Book of Windows Hacks
Big Book of Windows Hacks
Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB...
Innovation Happens Elsewhere: Open Source as Business Strategy
Innovation Happens Elsewhere: Open Source as Business Strategy
It's a plain fact: regardless of how smart, creative, and innovative your organization is, there are more smart, creative, and innovative people outside your organization than inside. Open source offers the possibility of bringing more innovation into your business by building a creative community that reaches beyond the barriers of the business....
Windows Server 2008 For Dummies (Computer/Tech)
Windows Server 2008 For Dummies (Computer/Tech)
If you’re curious, but hesitant, about finding your way around Microsoft’s new Windows Server 2008, Windows Server 2008 For Dummies is the book for you. This friendly reference shows you everything you need to know — from installation and deployment to building and running a Windows Server 2008 network.

...

Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
php|architect's Guide to Programming with Zend Framework
php|architect's Guide to Programming with Zend Framework
Learn to master the secrets of the Zend Framework with this new book from php|architect's popular Nanobook series! Written by Zend DevZone editor and well-known PHP expert Cal Evans, php|architect's Guide to Programming with Zend Framework helps you understand the Zend Framework through a detailed roadmap into its features and functionality....
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Hacking BlackBerry: ExtremeTech
Hacking BlackBerry: ExtremeTech
Here's an even better way to get your BlackBerry fix

Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or...

Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Linux Performance Tuning and Capacity Planning (Kaleidoscope)
Linux Performance Tuning and Capacity Planning (Kaleidoscope)

Covering topics from analysis tools to kernel tuning, to capacity management, this book offers a single point of reference for what you need to know. Anyone who has ever had to speed existing operations or project usage patterns for future loads, knows that tracking down the relevant information can be a difficult task. That's why this book has...

Result Page: 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy