Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Invasion of Privacy!  Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers

Pop-up ads, cookies, spyware, spam, junk mail, telemarketing calls. Rapidly evolving technology has made you a target and your personal information a desirable commodity. Your profile is out there and it’s available not just to the highest bidder, but to every bidder. Technology, advertising, the media, and government have converged to...

FreeBSD Unleashed (With CD-ROM)
FreeBSD Unleashed (With CD-ROM)
Did you know that the special effects used in The Matrix were rendered using the FreeBSD system? Yahoo and the Internet Movie Database are also powered by FreeBSD. Now you can learn how to use FreeBSD to its full potential as well! FreeBSD Unleashed is a complete reference guide for FreeBSD administrators, developers, webmasters...
British Political Leaders: A Biographical Dictionary
British Political Leaders: A Biographical Dictionary

This book is a biographical listing of the 198 British leaders who filled the top four offices of state and the post of secretary of state for the colonies between 1730 and the present. The entries are arranged in alphabetical order either by birth name or by title—whichever the given individual was best known by. For...

The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript

Learn everything you need to master the AdonisJs framework, including topics such as interacting with a database, rendering templates, writing asynchronous code, and hosting sites with SSL. Along the way, you’ll see how to build a commerce application, which lists products and allows shoppers to register and purchase those...

Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011
Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011

Rapid development of new technologies is leading to ever more versatile, multipurpose mobile devices, including 3G and 4G Internet-enabled cell phones. Wireless networking and wireless Internet access are developing and expanding on a global basis at a rapid rate. Meanwhile, RFID (radio frequency identification) will revolutionize wireless...

Advanced PHP Programming
Advanced PHP Programming

Over the past three years PHP has evolved from being a niche language used to add dynamic functionality to small sites to a powerful tool making strong inroads into large-scale, business-critical Web systems.

The rapid maturation of PHP has created a skeptical population of users from more...

Building Tablet PC Applications
Building Tablet PC Applications

The year is 2015. You find yourself resting on a beach in Maui, watching nearby youngsters zip along the boardwalk on their brand-new Segway Human Transporters. The sound of the ocean, ever so soft and reassuring, fills the air with its soothing rhythm. Your early retirement has treated you well—it’s not a bad...

Blog Design Solutions
Blog Design Solutions
Blogging has moved rapidly from being a craze to become a core feature of the Internet--from individuals sharing their thoughts with the world via online diaries, through fans talking about their favorite sports teams or music, right up to serious business minds discussing industry futures.

And that includes you, right? If you haven't
...
Facebook For Dummies
Facebook For Dummies

Facebook connects you with the people you know and care about. It enables you to communicate, stay up-to-date, and keep in touch with friends and family anywhere. It facilitates your relationships online to help enhance them in person. Specifically, Facebook connects you with the people you know around content that is important to you....

Venture Capitalists at Work: How VCs Identify and Build Billion-Dollar Successes
Venture Capitalists at Work: How VCs Identify and Build Billion-Dollar Successes

"This is probably the single most valuable resource for the entrepreneurs aspiring to build successful companies"―Ron Conway, Special Adviser, SV Angel, and investor in Facebook, Google, Twitter, Foursquare, PayPal, Zappos

"I highly recommend Venture Capitalists at Work. This book...

J2ME in a Nutshell
J2ME in a Nutshell
J2ME in a Nutshell provides a solid, no-nonsense reference to the 'alphabet soup' of micro edition programming, covering the CLDC, CDC, KVM and MIDP APIs. The book also includes tutorials for the CLDC, KVM, MIDP and MIDlets, MIDlet user interfaces, networking and storage, and advice on programming small handhelds. Combined with  O'Reilly's...
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy