Home | Amazing | Today | Tags | Publishers | Years | Search 
TortoiseSVN 1.7 Beginner's Guide
TortoiseSVN 1.7 Beginner's Guide

TortoiseSVN is a popular and easy-to-use Subversion client for Microsoft Windows. It is a Windows Shell extension, and is not limited to any particular IDE. TortoiseSVN is a free software which has been released under the GNU General Public License.

This book will help you to understand and use all of the features provided by...

Map Scripting 101: An Example-Driven Guide to Building Interactive Maps with Bing, Yahoo!, and Google Maps
Map Scripting 101: An Example-Driven Guide to Building Interactive Maps with Bing, Yahoo!, and Google Maps

The Web has changed our lives in many ways. The first online, on-demand driving directions from MapQuest very nearly rendered traditional road atlases obsolete. Today, many websites that provide driving directions also make their maps available to developers. Using these mapping APIs, you can plot your own points or...

Programming Amazon EC2
Programming Amazon EC2

Thank you for picking up a copy of this book. Amazon Web Services (AWS) has amazed everyone: Amazon has made lots of friends, and all its “enemies” are too busy admiring AWS to do much fighting back. At the moment, there is no comparable public Infrastructure as a Service (IaaS); AWS offers the services at a scale that has...

Programming Microsoft ASP.NET 4
Programming Microsoft ASP.NET 4

In the fall of 2004, at a popular software conference I realized how all major component vendors were advertising their ASP.NET products using a new word—Ajax. Only a few weeks later, a brand new module in my popular ASP.NET master class made its debut—using Ajax to improve the user experience. At its core, Ajax is a little...

Outsmarting Google: SEO Secrets to Winning New Business (Que Biz-Tech)
Outsmarting Google: SEO Secrets to Winning New Business (Que Biz-Tech)

If you own any other books on search engine optimization, throw them out. They belong to the mass of misinformation that has been swimming around for years, keeping people from making their websites truly appealing to search engines. And no surprise, Google loves it.

What I am about to share with you are the real, gritty,...

Essentials of Online payment Security and Fraud Prevention (Essentials Series)
Essentials of Online payment Security and Fraud Prevention (Essentials Series)

Doing business online is no longer an oddity, but the norm, and companies desiring to remain competitive have to maintain some form of online presence. Doing business online means a company has to be able to efficiently, reliably, and securely take payments from consumers and other merchants. This book is written to provide the...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Blender 2.5 Materials and Textures Cookbook
Blender 2.5 Materials and Textures Cookbook

The Blender 3D suite is probably one of the most used 3D creation and animation tools currently in existence. The reason for that popularity is both its tool set and the extraordinary fact that it can be downloaded free of charge. Blender has been around since 1998 but it was not until it entered the GNU General Public License, open source...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Deploying OpenStack
Deploying OpenStack

This book is aimed at developers, technologists, and system administrators eager to understand and deploy cloud computing infrastructure projects based upon OpenStack software. It is intended to provide the reader with a solid understanding of the Open- Stack project goals, details of specific OpenStack software components,...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Result Page: 147 146 145 144 143 142 141 140 139 138 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy