Home | Amazing | Today | Tags | Publishers | Years | Search 
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended....
Practical DWR 2 Projects (Expert's Voice in Java)
Practical DWR 2 Projects (Expert's Voice in Java)

The Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to develop. One of those libraries has risen near the top in the Java space, and that library is DWR. DWR, or Direct Web Remoting, allows you to treat your Java classes running on the server as if they were local objects running...

Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling

"Ron Goldman is a leading expert who knows the fundamental concepts and their interconnectedness, as well as the small details. The elegance of the writing and of the methods used to present the material allows us to get a deep understanding of the central concepts of CAGD. In its simplicity and pure beauty, the theory indeed resembles the...

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Make Projects: Small Form Factor PCs
Make Projects: Small Form Factor PCs
Shoebox sized and smaller, small form factor PCs can pack as much computing muscle as anything from a PDA to a full-sized desktop computer. They consume less power, have few or no moving parts, and are very quiet. Whether you plan to use one as a standalone PC or want to embed it in your next hacking project, a small form factor PC may be the next...
Big Book of Windows Hacks
Big Book of Windows Hacks
Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB...
Innovation Happens Elsewhere: Open Source as Business Strategy
Innovation Happens Elsewhere: Open Source as Business Strategy
It's a plain fact: regardless of how smart, creative, and innovative your organization is, there are more smart, creative, and innovative people outside your organization than inside. Open source offers the possibility of bringing more innovation into your business by building a creative community that reaches beyond the barriers of the business....
Windows Server 2008 For Dummies (Computer/Tech)
Windows Server 2008 For Dummies (Computer/Tech)
If you’re curious, but hesitant, about finding your way around Microsoft’s new Windows Server 2008, Windows Server 2008 For Dummies is the book for you. This friendly reference shows you everything you need to know — from installation and deployment to building and running a Windows Server 2008 network.

...

Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
php|architect's Guide to Programming with Zend Framework
php|architect's Guide to Programming with Zend Framework
Learn to master the secrets of the Zend Framework with this new book from php|architect's popular Nanobook series! Written by Zend DevZone editor and well-known PHP expert Cal Evans, php|architect's Guide to Programming with Zend Framework helps you understand the Zend Framework through a detailed roadmap into its features and functionality....
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy