Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Tester's Guide to .NET Programming
A Tester's Guide to .NET Programming
Today’s software testing environment has changed. A common trend we are seeing these days is
advertisements for software developers and testers that look virtually the same. Today, companies
all seem to require software test professionals with in-depth knowledge of programming languages
and with significant database skills.
...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Over the last five years or so a revolution has taken place, and continues to do so, that is changing the way we communicate and interact with each other and our environment. The advent of the Internet and the ubiquitous presence of mobile personal communications systems are the most prominent examples of this. The Internet has made it possible to...
I Married an eBay Maniac
I Married an eBay Maniac
Has your spouse been spending more and more time on the computer? Do they hide the screen when you walk in the room? Have new items been appearing in your house while your older possessions seem to disappear? Perhaps the explanation is in "it" - eBay mania! 

 

I Married...

The Modern Invention of Information: Discourse, History, and Power
The Modern Invention of Information: Discourse, History, and Power
If we look in the Oxford English Dictionary under the term “information,” we will be struck by the impression that its use as a substantive, as a synonym for fact or for knowledge, is relatively new. Until very recently, “information” had the sense of imparting knowledge (in the sense of telling someone something) or of...
Internet Information Services (IIS) 7.0 Administrator's Pocket Consultant
Internet Information Services (IIS) 7.0 Administrator's Pocket Consultant
Welcome to Internet Information Services (IIS) 7.0 Administrator's Pocket Consultant. As the author of over 65 books, I've been writing professionally about Web publishing and Web servers since 1994. Over the years, I've written about many different Web server technologies and products, but my favorite has always...
People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
The business environment has changed. Sharper competition requires organizations to exhibit greater effectiveness in their operations and services and faster creation of new products and servicesall hallmarks of the knowledge economy. Up until now, most of the knowledge management literature has focused on technology, systems, or culture. This book...
Encyclopedia of Information Communication Technology
Encyclopedia of Information Communication Technology
The Encyclopedia of Information Communication Technology (ICT) is a comprehensive resource describing the influence of information communication technology in scientific knowledge construction and spreading, with emphasis on the roles of product technologies, process technologies, and context technologies.

A reference point for studies...

Culture of Human Stem Cells (Culture of Specialized Cells)
Culture of Human Stem Cells (Culture of Specialized Cells)
The first book to collect the most effective and cutting-edge methods and protocols for deriving and culturing human embryonic and adult stem cells—in one handy resource

This groundbreaking new book follows the tradition of previous books in the Culture of Specialized Cells series—each methods and protocols chapter is laid out...

unlimited object storage image
Result Page: 471 470 469 468 467 466 465 464 463 462 461 460 459 458 457 456 455 454 453 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy