 |
|
 Microsoft Dynamics GP 2010 Cookbook
Microsoft Dynamics GP is an Enterprise Resource Planning system, essentially an accounting system on steroids, designed for mid-sized organizations. The implementation of Dynamics GP is usually considered to be complex, and people often realize there must be more efficient ways of working with the system. This book will show readers how to... |  |  Ubuntu: Powerful Hacks and Customizations
Tune, tweak, and change the popular Ubuntu Linux operating system!
Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops, and servers, and is used by millions of people around the world. This book provides you with practical hacks and tips that are not readily available online,... |  |  Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.
Enterprise Mac... |
|
|
 iPhone Games ProjectsOne look at the App Store will show you just how hot iPhone games have become. Games make up over 25 percent of all apps, and over 70 percent of the apps in the App Store's Most Popular category. Surprised? Of course not! We've all filled our iPhones with games, and many of us hope to develop the next best seller.
This book is a... |  |  Security Engineering: A Guide to Building Dependable Distributed Systems"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier
"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,... |  |  Encyclopedia of CybercrimeThe first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and... |
|
 Learning Perl on Win32 SystemsIn this smooth, carefully paced course, leading Perl trainers and a Windows NT practitioner teach you to program in the language that promises to emerge as the scripting language of choice on NT. Perl for Win32 is a language for easily manipulating text, files, user and group profiles, performance and event logs, and registry entries. Based on... |  |  Programming Perl (3rd Edition)Perl is a powerful interpreted programming language that has matured steadily since it first appeared in 1988. The first edition of this book, Programming Perl, hit the shelves in 1990, and was quickly adopted as the undisputed Bible of the language. Since then, Perl has grown with the times, and so has this book. Programming... |  |  |
|
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |