 |
|
 Amazon Hacks : 100 Industrial-Strength Tips & ToolsWhen Amazon.com opened its virtual doors on July 16, 1995, it was just one among several online booksellers. As Amazon embraced the technology to categorize and display millions of books in one space, people embraced the ability to search for and purchase books in a new way. The experience of building a successful business based... |  |  PayPal HacksPayPal wasn't the first company to build an online payment system, but it might as well be the last. With over 50 million registered accounts, PayPal is rapidly becoming a household name. But, as indicated, there have been others; PayPal's predecessors attempted to capitalize on the Internet boom by building new forms of... |  |  Word Hacks : Tips & Tools for Taming Your TextFew software applications are as ubiquitous as Microsoft Word, which has been around for more than 20 years—practically an eternity in computer time. Even as competitors, such as OpenOffice.org, emerge from the open source community, their success relies heavily on how much they look and act like Word. When most people... |
|
 PDF Hacks : 100 Industrial-Strength Tips &ToolsMany people think of Adobe's Portable Document Format (PDF) as a proprietary format for delivering unchangeable content that readers can print out or view on-screen conveniently. That may be how most people work with it, but you can do many more things with PDF, with or without Adobe's tools.
PDF has... |  |  Mac OS X Help Line, Tiger EditionWith every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted... |  |  Google Hacking for Penetration TestersGoogle Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious... |
|
 Wicked Cool Perl Scripts : Useful Perl Scripts That Solve Difficult ProblemsYou can do a lot of strange and wonderful things with the Perl language—if you know how. Many Perl programmers have been frustrated at one time or another because the system was missing some simple and obvious utility. Wicked Cool Perl Scripts is your guide to writing those utilities quickly and easily.
This book contains a wide... |  |  TiVo HacksForget all you think you know about watching television. Throw out the concepts of channels and lineups. VCR+ codes, your daily paper's TV listings, even the ubiquitous TV Guide need not apply. Primetime is a ghost of television's past.
Secede from the tyranny of the TV grid. Gone are the... |  |  Web Applications (Hacking Exposed)"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project
Unleash the hackers' arsenal to secure your Web applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |