Home | Amazing | Today | Tags | Publishers | Years | Search 
The Little Book of Bulletproof Investing: Do's and Don'ts to Protect Your Financial Life (Little Books. Big Profits)
The Little Book of Bulletproof Investing: Do's and Don'ts to Protect Your Financial Life (Little Books. Big Profits)

Investing do's and don'ts from some of the most recognizable voices in personal finance

It's been a tough year for investors. Many have seen their retirement accounts dwindle dramatically and are looking for a safe way to protect what they have and make back some of what they've lost. That's why the bestselling...

Using Mac OS X Snow Leopard
Using Mac OS X Snow Leopard

This book delivers a state-of-the-art, customized Snow Leopard learning experience to every user. It integrates outstanding step-by-step guidance and real-life examples with easy-to-use online content - including how-to screencasts, instructor videos, podcasts, and more. Leading computer trainer Yvonne Johnson covers...

Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

Concurrent Programming: Algorithms, Principles, and Foundations
Concurrent Programming: Algorithms, Principles, and Foundations

The advent of new architectures and computing platforms means that synchronization and concurrent computing are among the most important topics in computing science. Concurrent programs are made up of cooperating entities -- processors, processes, agents, peers, sensors -- and synchronization is the set of concepts, rules and mechanisms that...

Functional JavaScript: Introducing Functional Programming with Underscore.js
Functional JavaScript: Introducing Functional Programming with Underscore.js

How can you overcome JavaScript language oddities and unsafe features? With this book, you’ll learn how to create code that’s beautiful, safe, and simple to understand and test by using JavaScript’s functional programming support. Author Michael Fogus shows you how to apply functional-style concepts with...

Usability Testing of Medical Devices
Usability Testing of Medical Devices

To paraphrase a popular saying, usability testing should be done early and often. However, it doesn’t have to be an onerous process. Informative, practical, and engaging, Usability Testing of Medical Devices provides a simple, easy to implement general understanding of usability testing. It offers a general...

Data Protection & Compliance in Context
Data Protection & Compliance in Context

Data Protection and Compliance in Context is a comprehensive guide which: 1.explains the content of data protection laws; 2.provides practical advice on protecting data privacy under the Data Protection Act, human rights laws and freedom of information legislation; 3.gives data controllers a platform for building compliance strategies. Data...

Hacking For Dummies
Hacking For Dummies

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully...

Windows For Tablets For Dummies (For Dummies (Computer/Tech))
Windows For Tablets For Dummies (For Dummies (Computer/Tech))

Just for you--Windows 8 from the tablet user's perspective

If you're an experienced Windows user, you don't need a guide to everything that Windows 8 can do, just to those tools and functions that work on your tablet. And so here it is. This new book zeros in on what you need to know to work best on your tablet...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Mosby's Dental Drug Reference, 10e
Mosby's Dental Drug Reference, 10e

Ideal for chairside use by the entire dental team, Mosby's Dental Drug Reference provides guidelines for safe, accurate drug administration. More than 800 drug monographs make it easy to find indications and dosages, contraindications, interactions, side effects, serious reactions, and dental-specific drug information. With...

SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy