Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bike, Scooter, and Chopper Projects for the Evil Genius
Bike, Scooter, and Chopper Projects for the Evil Genius
Greetings! Glad that you decided to take an interest in the best hobby you will ever know! Maybe you are already a seasoned garage hacker and have decided to build a few of the projects from this book, adding your own special modifications, of course. Or, maybe you have never thought about taking an angle grinder to a working bicycle, chopping it...
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Introducing service orientation as a vision and philosophy that can impact a business, this innovative new book equips the reader to:
  • Best use technology resources to meet goals
  • Unleash their "inner nerd" to embrace IT as part of their business as a whole
  • Address the "mother of all business...
Apache Struts 2 Web Application Development
Apache Struts 2 Web Application Development

Struts 2.1 is a modern, extensible, agile web application framework suitable for both small- and large-scale web applications.

The book begins with a comprehensive look at Struts 2.1 basics, interspersed with detours into more advanced development topics. You'll learn about configuring Struts 2.1 actions, results, and interceptors via...

iPhone 3D Game Programming All In One
iPhone 3D Game Programming All In One

This is a complete guide to iPhone and iPod Touch game development. Beginning with the basics and ending with a finished game published in the App store this book covers all the fundamentals. The combined strength of Unity and the iPhone development platform are used to full effect allowing even complete novices to create and publish an...

Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis

As a programmer working for Logica UK in London in the mid-1980’s, I became a passionate advocate of formal methods. Extrapolating from small successes with VDM and JSP, I was sure that widespread use of formal methods would bring an end to the software crisis.

One approach especially intrigued me. John Guttag and Jim
...

Get Good with Money: Ten Simple Steps to Becoming Financially Whole
Get Good with Money: Ten Simple Steps to Becoming Financially Whole
NEW YORK TIMES, WALL STREET JOURNAL, AND USA TODAY BESTSELLER • A ten-step plan for finding peace, safety, and harmony with your money—no matter how big or small your goals and no matter how rocky the market might be—by the inspiring and savvy “Budgetnista.”

...
Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

Business Continuity Planning: A Step-by-Step Guide with Planning Forms on CD-ROM, Third Edition
Business Continuity Planning: A Step-by-Step Guide with Planning Forms on CD-ROM, Third Edition
Geared toward small and medium-sized firms, this easy-to-use, step-by-step guide provides the basic information to enable firms to start the development of their plans in the "classical" business continuity planning manner.

In this book, Ken Fulmer has provided us with a clear, easy-to-use resource for business continuity: a...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
trixbox CE 2.6
trixbox CE 2.6

The open source telephony platform trixbox CE is designed to implement a PBX system with features typically reserved for large enterprise businesses. trixBox allows an individual or organization to set up a telephone system with traditional telephone networks as well as internet-based telephony or VoIP. The task is time consuming and involves a...

Twitterville: How Businesses Can Thrive in the New Global Neighborhoods
Twitterville: How Businesses Can Thrive in the New Global Neighborhoods

Twitter is the most rapidly adopted communication tool in history, going from zero to ten million users in just over two years. On Twitter, word can spread faster than wildfire. Companies no longer have the option of ignoring the conversation.

Unlike other hot social media spaces, Twitterville is dominated by professionals,
...

unlimited object storage image
Result Page: 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy