Home | Amazing | Today | Tags | Publishers | Years | Search 
Enterprise Mac Administrator's Guide
Enterprise Mac Administrator's Guide

Charles Edge, Zack Smith, and Beau Hunter provide detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications.

Enterprise Mac Administrator's Guide addresses the growing size...

Learning OpenVPN 2.0.9
Learning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL...

Moodle 1.9 Math
Moodle 1.9 Math
Moodle is a popular e-learning platform that is making inroads into all areas of the curriculum. Using moodle helps you to develop exciting, interactive, and engaging online math courses. But teaching math requires use of graphs, equations, special notation, and other features that are not built into Moodle. Using Moodle to teach Mathematics...
Web 2.0 and Beyond: Understanding the New Online Business Models, Trends, and Technologies
Web 2.0 and Beyond: Understanding the New Online Business Models, Trends, and Technologies

Web 2.0 has taken on buzzword status. It's now shorthand for everything that is new, cutting-edge, and gaining momentum online. Web 2.0 can describe particular Web sites; cultural trends like social networking, blogging, or podcasting; or the underlying technology that makes today's coolest Web applications possible. Many Web 2.0 innovations...

Essential Facebook Development: Build Successful Applications for the Facebook Platform
Essential Facebook Development: Build Successful Applications for the Facebook Platform

“What sets this title apart is the authors’ deep insight of how to leverage the Facebook API to create wildly successful applications. They even provide instructions of how to a/b test, track, and analyze metrics to increase the exposure and engagement of your applications. Their knowledge is practical and after...

Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring (Water Quality Measurements)
Rapid Chemical and Biological Techniques for Water Monitoring presents in one volume the broad spectrum of monitoring tools, both available and under development, and provides an assessment of their potential for underpinning environmental management and legislation. The book explores screening methods in the context of water policies;...
Next Generation Information Technologies and Systems: 7th International Conference, NGITS 2009 Haifa, Israel, June 16-18, 2009 Revised Selected Papers
Next Generation Information Technologies and Systems: 7th International Conference, NGITS 2009 Haifa, Israel, June 16-18, 2009 Revised Selected Papers

This book constitutes the refereed post-conference proceedings of the 7th International Conference on Next Generation Information Technologies and Systems, NGITS 2009, held in Haifa, Israel, in June 2009.

The 14 revised full papers presented together with two keynote lectures and one invited paper were carefully reviewed and selected...

The Gender of Reparations: Unsettling Sexual Hierarchies while Redressing Human Rights Violations
The Gender of Reparations: Unsettling Sexual Hierarchies while Redressing Human Rights Violations
Reparations programs seeking to provide for victims of gross and systematic human rights violations are becoming an increasingly frequent feature of transitional and post-conflict processes. Given that women represent a very large proportion of the victims of these conflicts and authoritarianism, and that women arguably experience conflicts in a...
Introduction to Databases: From Biological to Spatio-Temporal (Texts in Computer Science)
Introduction to Databases: From Biological to Spatio-Temporal (Texts in Computer Science)

This textbook reveals the workings of numerous database systems, enabling readers to develop complex database applications. Students will gain hands-on experience by following the exercises. The theory is complemented by detailed examination of specific applications from a broad range of areas. The text assumes only basic discrete mathematics,...

Cyberinfrastructure Technologies and Applications
Cyberinfrastructure Technologies and Applications
Cyberinfrastructure was proposed in a report of the NSF Blue-Ribbon advisory panel in 2003. Cyberinfrastructure will provide a unified environment to access and manage cyber resources, e.g. supercomputers, data archives, software services, scientific instruments and virtual organizations.In this book, the authors review latest research and...
New Marketing
New Marketing
The New Marketing presents a comprehensively revised blueprint for the marketing process developed by Malcolm McDonald and Hugh Wilson to address second-generation changes brought about by technological development and the associated 'information revolution'. Built around the leading concept of a value exchange with customers, it provides essential...
Schaum's Outline of XML
Schaum's Outline of XML
Another spin-off of the browser wars has been the desire by the software giants to merge the Web and the desktop. With the browser becoming more of an application as well as a surfing tool, it grew in size, complexity, glitz, and glamour. What was needed was a simple, back-to-basics method of data exchange. It is not necessary to change the Web...
Result Page: 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy