Home | Amazing | Today | Tags | Publishers | Years | Search 
Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

Windows 7 Digital Classroom, (Book and Video Training)
Windows 7 Digital Classroom, (Book and Video Training)

This book is for anyone who wants to gain a better understanding of how to use and confi gure Windows 7. If you’re using Windows 7 at home or managing a small network at your offi ce, the Windows 7 Digital Classroom is for you. It is fi lled with useful, easy-to-understand advice and instructions. The Windows 7 Digital Classroom...

Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)

With more than 400 million active users and growing, it’s hard to ignore the buzz about Facebook. It’s a hot topic these days, and shows no signs of letting up. If you’re ready to get to the bottom of this Internet sensation and find out how to use this social networking phenomenon for yourself,...

Real World Haskell
Real World Haskell

Haskell is a deep language; we think learning it is a hugely rewarding experience. We will focus on three elements as we explain why. The first is novelty: we invite you to think about programming from a different and valuable perspective. The second is power: we’ll show you how to create software that is short, fast, and safe....

IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Redis Cookbook
Redis Cookbook

Redis is a data structure server with an in-memory dataset for speed. It is called a data structure server and not simply a key value store because Redis implements data structures allowing keys to contain binary safe strings, hashes, sets and sorted sets, as well as lists. This combination of flexibility and speed makes Redis the ideal tool...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

VLSI Physical Design: From Graph Partitioning to Timing Closure
VLSI Physical Design: From Graph Partitioning to Timing Closure

Physical design of integrated circuits remains one of the most interesting and challenging arenas in the field of Electronic Design Automation. The ability to integrate more and more devices on our silicon chips requires the algorithms to continuously scale up. Nowadays we can integrate 2e9 transistors on a single 45nm-technology chip. This...

Pro ASP.NET MVC 3 Framework
Pro ASP.NET MVC 3 Framework

ASP.NET MVC is a web development framework from Microsoft that combines the effectiveness and tidiness of model-view-controller (MVC) architecture, the most up-to-date ideas and techniques from agile development, and the best parts of the existing ASP.NET platform. It’s a complete alternative to traditional ASP.NET Web Forms,...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime

We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy