Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning C# 2008: From Novice to Professional, Second Edition
Beginning C# 2008: From Novice to Professional, Second Edition
This book is for anyone who wants to write good C# code—even if you have never programmed before. Writing good code can be a challenge—there are so many options, especially in a .NET language like C#. If you want to really get the best from a programming language, you need to know which features work best in which situations and...
Neighbor Law: Fences, Trees, Boundaries and Noise
Neighbor Law: Fences, Trees, Boundaries and Noise
The world is full of barking dogs and trespassing trees, spite fences and 2 a.m. rock fests, but your neighbor's lack of consideration needn't be your lifelong headache. The Nolo Press guide to Neighbor Law, eruditely and accessibly written by attorney Cora Jordan, explains all the laws relevant to noise, obstructed views, and...
SEO Warrior
SEO Warrior

I was compelled to write SEO Warrior for many reasons. Every day, thousands of sites are born in the hopes of making it big. Most of them will fail before achieving their goals. Many site owners create their sites blindly, without conducting proper research. Many site owners do not even know what search engine optimization (SEO) is and what its...

Prime Numbers: The Most Mysterious Figures in Math
Prime Numbers: The Most Mysterious Figures in Math

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?
...

Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Cryptography for Dummies
Cryptography for Dummies

Protect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flame-throwing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes...

Everything You Ever Wanted to Know About DVD
Everything You Ever Wanted to Know About DVD
JIM TAYLOR'S OFFICIAL DVD FAQ
When DVD newcomers and the DVD community itself want answers, they go to Jim Taylor's dvddemystified.com Website. But growing legions of DVD fans clamored for more. They asked for a book that puts DVD answers at their fingertips any time, anywhere!

PACKED WITH ANSWERS
...
Computer-Based Testing and the Internet: Issues and Advances
Computer-Based Testing and the Internet: Issues and Advances
We reside in various communities and live in one world. Although we may
reside in Beijing, China, on a kibbutz in Israel, or in Muleshoe, Texas, we are
aware of the impact of world events on our lives.

This has not always been true. Throughout most of history, life generally
was impacted by dominant qualities in
...
The Business of Streaming and Digital Media
The Business of Streaming and Digital Media
"...provides a number of very useful hints on how to make streaming successful (rather than merely profitable)."
EBU Technical Review

"This book offers a useful guide for building and managing a streaming and digital media business ... successfully." EBU Book Review

This book answers the
...
unlimited object storage image
Result Page: 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy