Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dreamweaver 8 : The Missing Manual
Dreamweaver 8 : The Missing Manual

Available for both the Mac and Windows, Macromedia's Dreamweaver 8 is a professional web design and development program used by millions of Internet professionals to build high-quality static and dynamic database-driven web sites. It offers drag-and-drop simplicity, streamlined HTML coding tools, and powerful database integration...

BEA WebLogic Workshop 8.1 Kick Start: Simplifying Java Web Applications and J2EE
BEA WebLogic Workshop 8.1 Kick Start: Simplifying Java Web Applications and J2EE

BEA WebLogic Workshop 8.1 Kick Start shows you how to make J2EE programming easier, providing the fastest path to productivity with BEA WebLogic Workshop 8.1. The authors show how Workshop leverages the power of BEA WebLogic Platform 8.1, including WebLogic Server, WebLogic Portal, and...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

eDirectory Field Guide
eDirectory Field Guide

eDirectory Field Guide is a handy reference for configuring, troubleshooting, and optimizing Novells eDirectory on NetWare, Linux, Unix, and Windows. Along with Sun ONE Directory Server and Microsoft Active Directory, Novells eDirectory is a leader in directory server software, the specialized database that enterprises employ to store...

Zen and the Art of Information Security
Zen and the Art of Information Security
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable...
MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computingand communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such...
Enabling Technologies for Mobile Services: The MobiLife Book
Enabling Technologies for Mobile Services: The MobiLife Book
This book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that...
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pattern recognition tasks. The first part of the book presents the application of graph theory to...
Fuzzy Logic and Intelligent Systems (International Series in Intelligent Technologies)
Fuzzy Logic and Intelligent Systems (International Series in Intelligent Technologies)
One of the attractions of fuzzy logic is its utility in solving many real engineering problems. As many have realised, the major obstacles in building a real intelligent machine involve dealing with random disturbances, processing large amounts of imprecise data, interacting with a dynamically changing environment, and coping with uncertainty....
Building XNA 2.0 Games: A Practical Guide for Independent Game Development
Building XNA 2.0 Games: A Practical Guide for Independent Game Development
Building XNA 2.0 Games: A Practical Guide for Independent Game Development is written by James Silva, who recently won the prestigious Microsoft Dream Build Play game competition with his award–winning title, The Dishwasher: Dead Samurai.

Building XNA 2.0 Games: A Practical Guide for Independent Game...

unlimited object storage image
Result Page: 1143 1142 1141 1140 1139 1138 1137 1136 1135 1134 1133 1132 1131 1130 1129 1128 1127 1126 1125 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy