Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Head First HTML with CSS & XHTML
Head First HTML with CSS & XHTML

Tired of reading HTML books that only make sense after you're an expert? Then it's about time you picked up Head First HTML with CSS & XHTML and really learned HTML. You want to learn HTML so you can finally create those web pages you've always wanted, so you can communicate more effectively with friends, family,...

Java Concurrency in Practice
Java Concurrency in Practice

"Java Concurrency in Practice is an invaluable compilation of threading know-how for Java developers. I found reading this book intellectually exciting, in part because it is an excellent introduction to Java's concurrency API, but mostly because it captures in a thorough and accessible way expert knowledge...

Weight Training For Dummies (Health & Fitness)
Weight Training For Dummies (Health & Fitness)
When the first edition of Weight Training For Dummies was published, lifting weights was on the verge of becoming a mainstream phenomenon. Women, Baby Boomers, seniors — all these groups were starting to get the message: Hoisting hunks of iron benefits everyone, not just bodybuilders with shoulders wider than the wingspan of a DC-10.
...
The Little Book of Bulletproof Investing: Do's and Don'ts to Protect Your Financial Life (Little Books. Big Profits)
The Little Book of Bulletproof Investing: Do's and Don'ts to Protect Your Financial Life (Little Books. Big Profits)

Investing do's and don'ts from some of the most recognizable voices in personal finance

It's been a tough year for investors. Many have seen their retirement accounts dwindle dramatically and are looking for a safe way to protect what they have and make back some of what they've lost. That's why the bestselling...

Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
Acustomer stumbling upon this book in a bookstore might ask, “Why is a book on directories and security is so important?”

The Internet is connecting enterprises into a global economy, and the interaction of directories is critical to the success of the New Economy. Consider, for example, Internet commerce in the United
...
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck...

Mastering Concurrency in Go
Mastering Concurrency in Go

Discover and harness Go's powerful concurrency features to develop and build fast, scalable network systems

About This Book

  • Explore the core syntaxes and language features that enable concurrency in Go
  • Understand when and where to use concurrency to keep data consistent and...
Fedora 8 and Red Hat Enterprise Linux Bible
Fedora 8 and Red Hat Enterprise Linux Bible
With the Fedora Linux operating system and the instructions in this book, you can transform your PC into a safe, powerful, and free computer system. Starting with Fedora, you can simply replace (or coexist with) Microsoft Windows on your everyday desktop computer. You can also configure your computer to share your files, printers, Web pages, or...
OS X Mountain Lion Server For Dummies
OS X Mountain Lion Server For Dummies

Create a Mac network in your home or office

There's no doubt about it: Macs, iPhones, and iPads have invaded the workplace. But, you don't need an IT department to administer a Mac network in your home or business. This friendly guide explains everything you need to know to set one up yourself using OS X Mountain...

Computer Security and Cryptography
Computer Security and Cryptography

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect...

Safe C++: How to avoid common mistakes
Safe C++: How to avoid common mistakes
Astute readers such as yourself may be wondering whether the title of this book, Safe C++, presumes that the C++ programming language is somehow unsafe. Good catch! That is indeed the presumption. The C++ language allows programmers to make all kinds of mistakes, such as accessing memory beyond the bounds of an...
Using Mac OS X Snow Leopard
Using Mac OS X Snow Leopard

This book delivers a state-of-the-art, customized Snow Leopard learning experience to every user. It integrates outstanding step-by-step guidance and real-life examples with easy-to-use online content - including how-to screencasts, instructor videos, podcasts, and more. Leading computer trainer Yvonne Johnson covers...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy