Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anywhere Computing with Laptops: Making Mobile Easier (One-Off)
Anywhere Computing with Laptops: Making Mobile Easier (One-Off)
You bought your Centrino laptop computer because of its ease-of-use and portability. But are you using your laptop to its maximum potential? Anywhere Computing with Laptops: Making Mobile Easier will show you what to expect when buying and configuring your laptop and how to use built-in features such as digital...
Wi-Fi Home Networking
Wi-Fi Home Networking

For many professionals, wireless home computer networking delivers the power of corporate technology — without the hassles of corporate living, and the mobile connectivity to all of the computers throughout your home (or backyard) — without rewiring.

That’s why if you plan to set up a wireless...

Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
Beginning Joomla!, Second Edition (Beginning from Novice to Professional)
Beginning Joomla!, Second Edition (Beginning from Novice to Professional)
Joomla!, exclamation point and all, is one of the most searched–for and hired–for open source content management systems in the world. Since 2007, the combination of Joomla! and Dan Rahmel’s bestselling Beginning Joomla!, From Novice to Professional have made it so that all you have to do is read a single...
C Interfaces and Implementations: Techniques for Creating Reusable Software
C Interfaces and Implementations: Techniques for Creating Reusable Software

Programmers are inundated with information about application programming interfaces, or APIs. Yet, while most programmers use APIs and the libraries that implement them in almost every application they write, relatively few create and disseminate new, widely applicable, APIs. Indeed, programmers seem to prefer to “roll their own”...

Programming in Lua, Second Edition
Programming in Lua, Second Edition

Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. "Programming in Lua" is...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Java How to Program (4th Edition)
Java How to Program (4th Edition)
Welcome to Java How to Program, Fourth Edition and the exciting world of programming with the Java™ 2 Platform, Standard Edition. This book is by an old guy and a young guy. The old guy (HMD; Massachusetts Institute of Technology 1967) has been programming and/or teaching programming for 40 years. The young guy (PJD; MIT 1991) has been...
Harnessing Hibernate
Harnessing Hibernate
Harnessing Hibernate is an ideal introduction to the popular framework that lets Java developers work with information from a relational database easily and efficiently. Databases are a very different world than Java objects, and they often involve people with different skills and specializations. With Hibernate, bridging these two worlds is...
Aptana Radrails: An Ide for Rails Development
Aptana Radrails: An Ide for Rails Development
Coming from a background of developing in languages such as Java, one of the things that surprised me the most about the Ruby and Rails community, was the common practice of not using an Integrated Development Environment. Most of the members of the community, including the most relevant, were comfortable with just a programmer's editor.
...
unlimited object storage image
Result Page: 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy