Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning CSS Web Development: From Novice to Professional
Beginning CSS Web Development: From Novice to Professional

Cascading Style Sheets (CSS) are one of the most important technologies on the web today. They give web developers the power to style their web sites so those sites are usable, compact, good looking, consistently displayable, and quick and efficient to change if so desired.

There are many books out there on CSS, but Beginning CSS Web...

Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
The Ethical Hack: A Framework for Business Value Penetration Testing
The Ethical Hack: A Framework for Business Value Penetration Testing

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required...

Secrets of the iPod
Secrets of the iPod
Everyone loves the iPod (though for a lot of us it's a fairly abstract love, given the gizmo's sticker price). In Secrets of the iPod, Christopher Breen--you may know him from TechTV--does a brain-dump on the latest version of the iPod. His coverage is complete, easy to read, and clearly reflects the personal experience of a man who likes...
Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000
Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000
For Windows 2003 SP1, Windows XP SP2, and Windows 2000

This fully updated third edition of Group Policy, Profiles, and IntelliMirror provides all the instruction and insight you need to take full advantage of your Active Directory with GPMC and other Group Policy tools. You'll also learn techniques for implementing...

Java Servlet Programming, 2nd Edition
Java Servlet Programming, 2nd Edition

Since I wrote the first edition of this book, servlets and the server-side Java platform have grown in popularity beyond everyone's wildest expectations. Adoption is pervasive. Web server vendors now offer servlet support as a standard feature. The Java 2, Enterprise Edition (J2EE), specification has included servlets...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Microsoft  Windows  XP Inside Out (2nd Edition)
Microsoft Windows XP Inside Out (2nd Edition)
Ed Bott and Carl Siechert have combined their considerable talents for producing user-level documentation in creating Microsoft Windows XP Inside Out. One of the most carefully researched books on Windows XP to date, this large volume has all the information and procedures most everyday users of the operating system will want. With its...
Mac OS X Help Line, Tiger Edition
Mac OS X Help Line, Tiger Edition
With every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted...
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Wicked Cool Perl Scripts : Useful Perl Scripts That Solve Difficult Problems
Wicked Cool Perl Scripts : Useful Perl Scripts That Solve Difficult Problems

You can do a lot of strange and wonderful things with the Perl language—if you know how. Many Perl programmers have been frustrated at one time or another because the system was missing some simple and obvious utility. Wicked Cool Perl Scripts is your guide to writing those utilities quickly and easily.

This book contains a wide...

PDF Hacks : 100 Industrial-Strength Tips &Tools
PDF Hacks : 100 Industrial-Strength Tips &Tools

Many people think of Adobe's Portable Document Format (PDF) as a proprietary format for delivering unchangeable content that readers can print out or view on-screen conveniently. That may be how most people work with it, but you can do many more things with PDF, with or without Adobe's tools.

PDF has...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy