Home | Amazing | Today | Tags | Publishers | Years | Search 
iPod and iTunes Starter Kit
iPod and iTunes Starter Kit
The iPod and iTunes are the hottest technologies in the world of digital music today. Whether you're a Mac or Windows user, the iPod and iTunes Starter Kit provides all the information that you need to get the most out these amazing digital music tools, including the Apple iTunes Music Store. From the basics of...
Apple Pro Training Series : Logic Pro 7 and Logic Express 7
Apple Pro Training Series : Logic Pro 7 and Logic Express 7
With a new plug-in that re-creates the sounds of 11 of the world's best-known guitar amps, distributed audio processing (which lets you tap into a virtually unlimited number of Macs), new software instruments (including a killer drum machine), and a slew of workflow enhancements, it's no wonder you're chomping at the bit to start using Logic Pro 7...
Virtualization with VMware ESX Server
Virtualization with VMware ESX Server

A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. VMware's ESX server is the enterprise tool that provides the platform on which a complete virtual infrastructure can be designed,...

Open Source Licensing : Software Freedom and Intellectual Property Law
Open Source Licensing : Software Freedom and Intellectual Property Law
A complete guide to the law of open source for developers, managers, and lawyers

Now that open source software is blossoming around the world, it is crucial to understand how open source licenses work—and their solid legal foundations. Open Source Initiative general counsel Lawrence Rosen presents a plain-English guide to open source law...

Visions Of Mind: Architectures For Cognition And Affect
Visions Of Mind: Architectures For Cognition And Affect
"What is mind?" "Can we build synthetic or artificial minds?" Think these questions are only reserved for Science Fiction? Well, not anymore. This collection presents a diverse overview of where the development of artificial minds is as the twenty first century begins. Examined from nearly all viewpoints, Visions of Mind...
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Marketing Insights from A to Z: 80 Concepts Every Manager Needs to Know
Marketing Insights from A to Z: 80 Concepts Every Manager Needs to Know
Praise for Philip Kotler’s MARKETING INSIGHTS FROM A to Z

"There’s only one name in marketing: Phil Kotler. His latest may be his best–a summa that captures the best of his insights, as original today as when he first took pen in hand, forty years ago."
–Tom Peters, author of In Search of Excellence and
...

Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Now there's a definitive insider's guide to planning, installing, configuring, and maintaining the newest version of the world's #1 firewall: Check Point™ FireWall-1® Next Generation™. Leading Check Point support authority Dameon Welch-Abernathy (a.k.a. PhoneBoy) offers exclusive hands-on tips, techniques, checklists, and...
Optimizing Oracle Performance
Optimizing Oracle Performance
Oracle DBAs and developers are all too familiar with the outlay of time and resources, blown budgets, missed deadlines, and marginally effective performance fiddling that is commonplace with traditional methods of Oracle performance tuning. In Optimizing Oracle Performance, Cary Millsap, former VP of Oracle's System...
Advanced Host Intrusion Prevention with CSA
Advanced Host Intrusion Prevention with CSA
The Cisco Security Agent product is extremely successful in protecting endpoints around the world. The power it
provides must be understood to use it effectively and efficiently. This book attempts to provide guidance and examples
to help CSA users worldwide do just that.

This book is intended for anyone currently using the CSA
...
Sams Teach Yourself UNIX System Administration in 24 Hours
Sams Teach Yourself UNIX System Administration in 24 Hours

In the wake of the highly successful Sams Teach Yourself Unix in 24 Hours, this book focuses on the additional Unix commands that an advanced user or beginning system administrator needs to know in order to administer and maintain a Unix system. The book includes coverage of the key Unix variations: Red Hat Linux, Solaris, HPUX, and Apple's Mac...

VB.NET Language in a Nutshell
VB.NET Language in a Nutshell
Need to make sense of the many changes to Visual Basic for the new .NET platform? VB .NET
Language in a Nutshell introduces the important aspects of the language and explains the .NET
framework. An alphabetical reference covers the functions, statements, directives, objects, and object
members that make up the VB .NET language. To
...
Result Page: 1083 1082 1081 1080 1079 1078 1077 1076 1075 1074 1073 1072 1071 1070 1069 1068 1067 1066 1065 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy