Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Becoming A Master Student, 12th edition
Becoming A Master Student, 12th edition

The Twelfth Edition of the bestselling Becoming a Master Student continues to lead the way in meeting the changing needs of today's first-year students. Through interactive journaling, a motivational writing style, and hands-on activities that students can apply right away, this text helps students succeed in college and in life. The...

WebGL Hotshot
WebGL Hotshot

Create interactive 3D content for web pages and mobile devices with this book and ebook

Overview

  • Simple, ready-to-use interactive 3D demonstrations and explanations for a variety of popular and innovative websites
  • Detailed overview of how to build 3D environments including features such as...
PhoneGap by Example
PhoneGap by Example

Use PhoneGap to apply web development skills and learn variety of cross-platform mobile applications

About This Book

  • Utilize the robust features of the mobile hybrid approach to develop, test, and publish mobile applications using the PhoneGap framework
  • Use your web skills for hybrid...
Adobe Creative Suite 6 Design and Web Premium All-in-One For Dummies
Adobe Creative Suite 6 Design and Web Premium All-in-One For Dummies

The must-have book on the leading suite of software for graphic and web designers

Fully revised and updated this hands-on resource offers a one-stop learning opportunity through eight minibooks dedicated to each product inside Adobe's Design & Web Premium Suite. The minibooks include Adobe Creative Suite Basics,...

Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and...

The qmail Handbook
The qmail Handbook
  • Provides thorough instruction for installing, configuring, and optimizing qmail
  • Includes coverage of secure networking, troubleshooting issues, and mailing list administration
  • Covers what system administrators want to know by concentrating on qmail issues relevant to daily operation
  • ...
Mac OS X Version 10.3 Panther Fast & Easy
Mac OS X Version 10.3 Panther Fast & Easy

Navigate the Aqua interface like a pro as you quickly master version 10.3 tasks, including managing your files and disks and customizing your Mac. From the basics of working with menus and desktop setup to the cool features of iTunes, iPhoto, and iChat, you'll handle your Mac with confidence. Full of step-by-step instructions and...

Ruby Developer's Guide
Ruby Developer's Guide
"Ruby Developer's Guide" discusses the role of Ruby in real-world applications, including the use of databases and XML, the coding of graphical user interfaces (GUIs) by means of different toolkits, communicating with other languages over SOAP/XML-RPC or sockets, and the programming of concurrent and distributed applications. Using...
Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
AVVID (Architecture for Voice, Video, and Integrated Data) is a network architecture made up of hardware and software that transmits a company’s data such as e-mail, web traffic, file transfers, voice traffic, and video traffic over the same physical computer network. Imagine taking the three networks your...
Coding for Wireless Channels (Information Technology: Transmission, Processing and Storage)
Coding for Wireless Channels (Information Technology: Transmission, Processing and Storage)
Coding for Wireless Channels is an accessible introduction to the theoretical foundations of modern coding theory, with applications to wireless transmission systems. State-of-the-art coding theory is explained using soft (maximum-likelihood) decoding rather than algebraic decoding. Convolutional codes, trellis-coded modulation,...
CCDA Exam Certification Guide ((CP) CERTIFICATION)
CCDA Exam Certification Guide ((CP) CERTIFICATION)
The official study guide for DCN exam #640-441Coverage of the CCDA exam design objectives enables you to discover your knowledge gaps before the exam date. You'll learn to:Characterize a customer's existing network and identify customer needsSimplify the complexities associated with analyzing customer network problems and creating Cisco scalable...
Managing Web Service Quality: Measuring Outcomes and Effectiveness (Premier Reference Source)
Managing Web Service Quality: Measuring Outcomes and Effectiveness (Premier Reference Source)
Web services are increasingly important in information technology with the expansive growth of the Internet. As services proliferate in domains ranging from e-commerce to digital government, the need for tools and methods to measure and guide the achievement of quality outcomes is critical for organizations.

Managing Web Service...

unlimited object storage image
Result Page: 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy