Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
FreeBSD 6 Unleashed
FreeBSD 6 Unleashed
This book teaches the reader everything he/she needs to know in order to use FreeBSD to its full potential. It will show individuals how to use the same FreeBSD power that Yahoo!, the Internet Movie Database, and many other high profile internet sites depend on. Whether someone needs an enterprise class server, a small business server, or a...
Digital Rights Management: Technological, Economic, Legal and Political Aspects
Digital Rights Management: Technological, Economic, Legal and Political Aspects
The content industries consider Digital Rights Management (DRM) to contend with unauthorized downloading of copyrighted material, a practice that costs artists and distributors massively in lost revenue.

Based on two conferences that brought together high-profile specialists in this area - scientists, lawyers, academics, and business...

The Java EE 6 Tutorial: Basic Concepts (4th Edition) (Java Series)
The Java EE 6 Tutorial: Basic Concepts (4th Edition) (Java Series)

The Java EE 6 Tutorial: Basic Concepts, Fourth Edition, is a task-oriented, example-driven guide to developing enterprise applications for the Java Platform, Enterprise Edition 6 (Java EE 6). Written by members of the Java EE 6 documentation team at Oracle, this book provides new and intermediate Java programmers with a deep...

Drupal 7 Multilingual Sites
Drupal 7 Multilingual Sites
Recent estimates show at least 1.5 million websites run on Drupal, which calculates to roughly two percent of all sites. Drupal is used to create personal, business, government, and educational websites including high-profile ones such as whitehouse.gov, duke.edu, and economist.com. Drupal adoption is following a very positive...
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Wind Energy Meteorology: Atmospheric Physics for Wind Power Generation (Green Energy and Technology)
Wind Energy Meteorology: Atmospheric Physics for Wind Power Generation (Green Energy and Technology)

This book is intended to give an introduction into the meteorological boundary conditions for power generation from the wind, onshore and offshore. It is to provide reliable meteorological information for the planning and running of this important kind of renewable energy. This includes the derivation of wind laws and wind profile...

iPhone SDK Application Development: Building Applications for the AppStore
iPhone SDK Application Development: Building Applications for the AppStore
This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK...
Facebook Marketing For Dummies
Facebook Marketing For Dummies

Discover how to leverage the power of the Facebook community to achieve your business marketing goals

Facebook boasts an extremely devoted user base, with more than 65 billion page visits per month. With Facebook, an organization can market and promote their brand, products, or services via the network's built-in...

Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

Robust Signal Processing for Wireless Communications (Foundations in Signal Processing, Communications and Networking)
Robust Signal Processing for Wireless Communications (Foundations in Signal Processing, Communications and Networking)
Optimization of adaptive signal processing algorithms for wireless communications is based on a model of the underlying propagation channel. In practice, this model is never known perfectly. For example, its parameters have to be estimated and are only known with significant errors.

In this book, a systematic treatment of this practical design...

The Customer Rules
The Customer Rules
At a recent family gathering in my home, the grown-ups were trading stories about companies that provide good customer service and those that don't. Out of curiosity, I asked my then twelve-year-old granddaughter, Margot, what she thought were the most important rules for great service. Without a moment's hesitation, she...
Adoption-centric Usability Engineering: Systematic Deployment, Assessment and Improvement of Usability Methods in Software Engineering
Adoption-centric Usability Engineering: Systematic Deployment, Assessment and Improvement of Usability Methods in Software Engineering
Where should usability techniques and HCD knowledge be considered in the existing software development lifecycle to maximize benefits gained from SE and HCD approaches? This book provides an integrative answer while proposing a systematic approach for the adoption, assessment and deployment of usability engineering methods within software...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy