Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Your Computers & Devices Step by Step
Network Your Computers & Devices Step by Step

In a modern home, it is no longer unusual for family members to own multiple computers and network devices. In most houses, you can find at least a desktop computer, which is generally used for more performance-intensive tasks such as gaming or professional work of any kind. Parents bring home their work laptops or notebooks, which they...

TortoiseSVN 1.7 Beginner's Guide
TortoiseSVN 1.7 Beginner's Guide

TortoiseSVN is a popular and easy-to-use Subversion client for Microsoft Windows. It is a Windows Shell extension, and is not limited to any particular IDE. TortoiseSVN is a free software which has been released under the GNU General Public License.

This book will help you to understand and use all of the features provided by...

Oracle CRM On Demand Deployment Guide (Osborne ORACLE Press Series)
Oracle CRM On Demand Deployment Guide (Osborne ORACLE Press Series)

In less than a decade, the online delivery of software has transformed the business software landscape. The concept of online delivery is simple: A software company develops an application, hosts the software on its own servers, and makes it available to companies over the Internet. Companies sign up to use the application and pay for...

Kengo Kuma: Selected Works
Kengo Kuma: Selected Works

Evanescent. Restrained. Ethereal. These are some of the words used to describe the architecture of Kengo Kuma, one of the most heralded of a new generation of Japanese architects. A recent article in Architecture writes of Kuma that "he strives to give his buildings the qualities of a rainbow, composed of shimmering particles,...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking

This book provides an overview of steganography and digital watermarking, two areas of research which are generally referred to as "information hiding." Steganography studies ways to make communication invisible by hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...

Home Networking Do-It-Yourself For Dummies
Home Networking Do-It-Yourself For Dummies

Fifty years ago, most households had only one television and one telephone. As the price of these technological marvels dropped, families began purchasing additional televisions and telephones — and the home network was born!

Think about it: Your televisions are basically networked together on a cable network. Okay, not a...

Developments in the Theory of Cationoid Polymerisations
Developments in the Theory of Cationoid Polymerisations

I first met Peter Plesch in the late 1950s when he had established his vacuum techniques in Keele and I was embarking on my PhD. My visit to Keele was to seek advice (freely given) on handling sensitive reaction systems. I rapidly came to appreciate that Peter operated on a somewhat higher intellectual plane than many academics. All...

Bioassay Techniques for Drug Development
Bioassay Techniques for Drug Development

The so-called “green wave”, triggered by a growing ecological awareness, has resulted in an increased interest in herbal formulations throughout the world, particularly in the last decade. The consumption of medicinal plants has almost doubled in the West during that period. The efficacy of a number of herbal formulations...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Windows Small Business Server 2011 Administrator's Companion
Windows Small Business Server 2011 Administrator's Companion

If you run a small business, you don’t need us to tell you that the highly competitive marketplace, unpredictable economic cycles, time pressures, and technological demands are constantly exerting pressure on your bottom line.

Your business needs the same technologies that large companies do. You need the...

Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy