|
|
|
|
Joomla! Social Networking with JomSocial
JomSocial is a social publishing platform for Joomla! content management system. It allows you to connect with friends, integrate videos, follow users' activity stream, share photos, create groups, and customize your brand.
JomSocial is an out-of-the-box extension that enables a Joomla! website administrators to set up a social... | | Neural Networks in Business ForecastingForecasting is one of the most important activities that form the basis for strategic, tactical, and operational decisions in all business organizations. Recently, neural networks have emerged as an important tool for business forecasting. There are considerable interests and applications in forecasting using neural networks. Neural Networks... | | Role-Based Access Control, Second EditionRole-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners... |
|
| | Publishing a Blog with Blogger : Visual QuickProject GuideWriting in a journal is all well and good, but when you're ready to share your musings with the world (and you think the world is ready to receive them!), a blog is the way to go. As the latest phenomenon to grow out of the Web, the blog (or Web log) is a diary... | | Encyclopedia of White-Collar & Corporate Crime (Multi-Volume Set)With more than 500 entries (including up-to-date information on such high profile cases as Martha Stewart and Enron), the Encyclopedia of White-Collar & Corporate Crime gathers history, definitions, examples, investigation, prosecution, assessments, challenges, and projections into one definitive reference work on the topic. The Encyclopedia... |
|
|
Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | The Facebook Guide for People Over 50
The Facebook guide for people over 50
People over 50 are the fastest-growing segment of the Facebook population, and they have some unique interests and concerns. This one-of-a-kind guide addresses issues of specific interest to older generations, helping them create a profile, connect with old friends and relatives,... | | Mastering PerlThis is the third in O'Reilly's series of landmark Perl tutorials, which started with Learning Perl, the bestselling introduction that taught you the basics of Perl syntax, and Intermediate Perl, which taught you how to create re-usable Perl software. Mastering Perl pulls everything together to show you how to bend Perl... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |