 |
|
 Yahoo! HacksYahoo! took the world by storm in the 1990s as a one-of-a-kind, searchable list of interesting web sites. But ten years later, it has expanded into a department store overflowing with useful and innovative tools and services-from email, blogging, social networking, and instant messaging, to news, financial markets, shopping,... |  |  Pro OpenSSHSSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment.
Some of the... |  |  Web Server ProgrammingWhen the web transitioned from a publishing to an interactive e-commerce medium, standardised web-browsers entered widespread use and developers were able to rely on a relatively stable client component. Since then, server-side developments have blossomed and resulted in considerable ease of programming, efficiency and increasing sophistication of... |
|
|
 CSS Hacks and Filters: Making Cascading Stylesheets WorkHere's how to make CSS work the way it should
Cascading Style Sheets, the technology meant to bring order out of chaos by letting you update Web sites effortlessly, just doesn't always work. You recognize that when you discover your graphics, perfectly positioned in Firefox, throw your page out of whack when viewed in Explorer. The solution?... |  |  Dreamweaver 8 All-in-One Desk Reference For Dummies9 books in 1 — your key to Dreamweaver success!
Your one-stop guide to building and maintaining high-impact Web sites
Dreamweaver is the top pick of Web designers looking for a powerful, cross-platform tool that produces professional Web sites. With this complete reference... |  |  HackNotes(tm) Web Security Pocket ReferenceHackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted... |
|
 Blog Design SolutionsBlogging has moved rapidly from being a craze to become a core feature of the Internet--from individuals sharing their thoughts with the world via online diaries, through fans talking about their favorite sports teams or music, right up to serious business minds discussing industry futures. And that includes you, right? If you haven't... |  |  Ubuntu UnleashedIncorporating an advanced approach to presenting information about Ubuntu, Ubuntu Unleashed aims to provide the best and latest information that intermediate to advanced Linux users need to know about installation, configuration, system administration, server operations, and security. Written by renowned open source... |  |  Beginning XML with DOM and Ajax: From Novice to ProfessionalThis books aims to provide a “one-stop shop” for developers who want to learn how to build Extensible Markup Language (XML) web applications. It explains XML and its role in the web development world. The book also introduces specific XML vocabularies and related XML recommendations.
I wrote the book for web developers at all... |
|
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 |