Home | Amazing | Today | Tags | Publishers | Years | Search 
Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
JNCIE: Juniper Networks Certified Internet Expert Study Guide
JNCIE: Juniper Networks Certified Internet Expert Study Guide
Greetings and welcome to the world of Juniper Networks. This introductory section serves
as a location to pass on to you some pertinent information concerning the Juniper Networks
Technical Certification Program. In addition, you’ll find information about how the book itself
is laid out and what it contains. Finally,
...
Object-Oriented Analysis and Design with Applications (2nd Edition)
Object-Oriented Analysis and Design with Applications (2nd Edition)
In this eagerly awaited second edition, Grady Booch draws upon the rich and varied results of those projects and offers improved methods for object development and a new, unified notation. With numerous examples implemented in C++, Booch illustrates essential concepts, explains the method, and shows successful applications in a variety of fields....
Learning Perl/Tk: Graphical User Interfaces with Perl (O'Reilly Nutshell)
Learning Perl/Tk: Graphical User Interfaces with Perl (O'Reilly Nutshell)
By combining the rough-and-ready Perl language with the graphical user interface (GUI) capabilities of the Tk toolkit, Perl/Tk makes it easy to write event-based GUI applications quickly--once you know what you're doing. Learning Perl/Tk shows you how to build GUIs with everyone's favorite public-domain programming language. This book...
Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
Creating a Presentation in PowerPoint: Visual QuickProject Guide
Creating a Presentation in PowerPoint: Visual QuickProject Guide
PowerPoint is nearly ubiquitous in today's world--in business settings, of course, but in schools and universities, clubs and organizations--almost everywhere you turn. It's not a difficult tool to use, but the presentations people create in PowerPoint range widely in quality--dazzling or dull, enlivening or enervating. Now, to help users deliver...
The Digital SLR Guide: Beyond Point-and-Shoot Digital Photography
The Digital SLR Guide: Beyond Point-and-Shoot Digital Photography
Have you stepped up to a digital single-lens-reflex (dSLR) camera only to find the range of capabilities daunting? Combining features traditionally found on 35mm film cameras — precise shutter speed and exposure settings, interchangeable lenses and accessories, superior image quality — with the ease and storage capacity...
Foundation 3ds Max 8 Architectural Visualization
Foundation 3ds Max 8 Architectural Visualization
Welcome to the world of 3D architectural visualizations using the most powerful and versatile 3D software package on the planet: 3ds Max. In just the last few years, the visualization industry has arguably become the fastest-growing 3D industry, and may soon overtake all others in total number of users. Just as the use of CAD became the norm for...
Learning WML and WMLScript
Learning WML and WMLScript
The next generation of mobile communicators is here, and delivering content to them will mean programming in WML (Wireless Markup Language) and WMLScript, the languages of the Wireless Application Environment (WAE). The WAE allows information in almost all applications to be formatted for display on mobile devices, such as cell phones, and...
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
VB and VBA in a Nutshell: The Languages
VB and VBA in a Nutshell: The Languages
VB & VBA in a Nutshell: The Languages documents the latest version of the world's bestselling rapid application development environment. Paul Lomax's explanation of the language comes in two main parts.

First, Lomax explains the structure and syntax of Visual Basic (VB) and Visual Basic for Applications (VBA) programs. He details...

iPod: The Missing Manual
iPod: The Missing Manual
With iPod and iTunes, Apple's gotten the world hooked on portable music, pictures, and videos. One thing they haven't delivered, though, is an easy guide for getting the most from your sleek little entertainment center. Enter iPod: The Missing Manual, 5th Edition-a book as breathtaking and satisfying as its subject.

Our latest edition...

Result Page: 1134 1133 1132 1131 1130 1129 1128 1127 1126 1125 1124 1123 1122 1121 1120 1119 1118 1117 1116 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy