Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Upgrading and Repairing PCs (W/DVD)
Upgrading and Repairing PCs (W/DVD)
Upgrading and Repairing PCs is the de facto standard PC hardware tome used by more PC professionals and hobbyists than any other book of its kind - selling more than 2.1 million copies in it's 13-edition history. In the 13th Edition, Scott has pulled out all of the stops, adding hundreds of page of new material, two hours of all new video and more...
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems

Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions...

Micromessaging: Why Great Leadership is Beyond Words
Micromessaging: Why Great Leadership is Beyond Words

Should you sweat the small stuff?

Absolutely, says Stephen Young-especially when it comes to those critical behaviors that can make or break performance. The reason is simple: no matter what you think you're saying, your words, gestures, and tone of voice can actually communicate something entirely different.

...

C++ Standard Library Practical Tips (Programming Series)
C++ Standard Library Practical Tips (Programming Series)
Put the Power of the C++ Standard Library to Work!

C++ Standard Library Practical Tips teaches beginning and experienced programmers how to use the Standard Library and its major component the Standard Template Library (STL) effectively in routine programming chores. The book provides 100 quick, easy-to-use tips and solutions to common...

Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualization: A powerful technique for achieving high performance

Complex systems do not require complex project management. The most effective project managers are able to simplify their project environment and organize projects, large and small, to achieve predictable results. This book explains how anyone responsible for a project can apply...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

iOS 6 Programming Cookbook
iOS 6 Programming Cookbook
The long-awaited iOS 6 SDK (Software Development Kit) is finally out, and we need to learn about all the great features that this release offers us. Apple did a great job adding new features to the SDK and, of course, to iOS itself. iOS 6 is much more stable than the previous versions of iOS, as you would expect....
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Apple Boot Camp Public Beta First Look
Apple Boot Camp Public Beta First Look
Unlike emulation systems such as Microsoft's Virtual PC, Apple's new Boot Camp takes advantage of the fact that your new Intel-equipped iMac, Mac mini or MacBook Pro uses the same type of Intel processor that normal Windows PCs use, allowing you to now run Windows XP on your Intel-equipped Mac at full speed. While most of the information currently...
New Horizons of Parallel and Distributed Computing (Kluwer International Series in Engineering and Computer Science)
New Horizons of Parallel and Distributed Computing (Kluwer International Series in Engineering and Computer Science)

Parallel and distributed computing is one of the foremost technologies for shaping
future research and development activities in academia and industry. Hyperthreading in Intel processors, hypertransport links in next generation AMD processors, multicore silicon in today’s high-end microprocessors, and emerging cluster and grid
...

Big Book of Apple Hacks: Tips & Tools for Unlocking the Power of Your Apple Devices
Big Book of Apple Hacks: Tips & Tools for Unlocking the Power of Your Apple Devices
Ostensibly, you buy a computer or gadget to get something done. The something might be as simple as listening to MP3s you’ve ripped from your CD collection or as challenging as creating a full-length feature film. Apple is happy to sell you products to meet your needs. The trouble is your needs aren’t...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy