Home | Amazing | Today | Tags | Publishers | Years | Search 
Joomla!: Visual QuickStart Guide (2nd Edition)
Joomla!: Visual QuickStart Guide (2nd Edition)

Building on the first edition of Joomla!: Visual QuickStart Guide, this task-based guide is the perfect tool for those just starting with Joomla, as well as, seasoned professionals who want to know how to use the latest version of the software to its fullest. It shows how to create, customize, and maintain a dynamic Joomla 1.6 website...

Amazon Web Services: Migrating Your .NET Enterprise Application
Amazon Web Services: Migrating Your .NET Enterprise Application

Amazon Web Services is an Infrastructure as a Service (IaaS) platform in the Cloud, which businesses can take advantage of as their needs demand. The Amazon Cloud provides the enterprise with the flexibility to choose whichever solution is required to solve specific problems, ultimately reducing costs by only paying for what you use.

...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Software Development and Professional Practice
Software Development and Professional Practice

What’s this book all about? Well, it’s about how to develop software, from a personal perspective. We’ll look at what it means for you to take a problem and produce a program to solve it from beginning to end. That said, this book focuses a lot on design. How do you design software? What things do you take into...

Applied jQuery: Develop and Design
Applied jQuery: Develop and Design

As Web designers, you are painstakingly compelled to grab Web surfers’ attention as quickly as possible and then keep them on your site to absorb the content. In addition to the product, service, or information that you are providing, the site must be visually attractive and offer stimulating (and valuable) interaction. The...

Pro Oracle Application Express 4
Pro Oracle Application Express 4

If you’re new to APEX development, prepare yourself for one of the most productive tools available for Oracle application development. The speed with which you can create fully functional, secure, webbased applications is truly astounding, especially when compared to using a tool like Java. If you are used to writing procedural or...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

BGP
BGP

This is a book about connecting to the Internet as reliably as possible. This means eliminating all single points of failure,including having just one Internet service provider (ISP). By multihoming to two or more ISPs,you can remain connected when either ISP (or your connection to them) experiences problems. However,there...

Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)
Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)

Stable and dependable IT services and infrastructures are nowadays of paramount importance not only for modern enterprises but also for home users. However, as distributed information infrastructures continue to spread and grow, resulting in Internet-based, wireless and mobile systems, traditional solutions for managing and...

Security on the Web, Volume 83 (Advances in Computers)
Security on the Web, Volume 83 (Advances in Computers)

This is Volume 83 of the Advances in Computers, subtitled Security on the Web. This series, continuously published since 1960, is the oldest series covering the development of the computer industry. With the impact that the World Wide Web has on every facet of our lives today, this volume focuses on the security aspect of computing....

CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204 (CWNP Official Study Guides)
CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204 (CWNP Official Study Guides)

If you have purchased this book or if you are even thinking about purchasing this book, you probably have some interest in taking the CWSP ® (Certifi ed Wireless Security Professional) certifi cation exam or in learning what the CWSP certifi cation exam is about. The authors would like to congratulate you on this fi rst step, and we...

Result Page: 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy