Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...

Microsoft SharePoint: Building Office 2003 Solutions, Second Edition
Microsoft SharePoint: Building Office 2003 Solutions, Second Edition
Almost five years ago, when I completed my sixth book, Scot Hillier’s COM+ Programming with Visual Basic (SAMS, 2000), I thought I was done with technical writing. Since then, I have seen some new technologies emerge, but...
PHP Solutions: Dynamic Web Design Made Easy
PHP Solutions: Dynamic Web Design Made Easy
In this book you'll learn how to:
  • Create dynamic websites with design and usability in mind, as well as functionality
  • Understand how PHP scripts work, giving you confidence to adapt them to your own needs
  • Bring online forms to life, check required fields, and ensure user input is safe to process
  • ...
Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Founders at Work: Stories of Startups' Early Days (Recipes: a Problem-Solution Ap)
Founders at Work: Stories of Startups' Early Days (Recipes: a Problem-Solution Ap)
Sprinters apparently reach their highest speed right out of the blocks, and spend the rest of the race slowing down. The winners slow down the least. It’s that way with most startups too. The earliest phase is usually the most productive. That’s when they have the really big ideas. Imagine what Apple was like when 100 percent of its...
DB2 Information Integrator And Websphere Portal Server: A Synergistic Solution (IBM Redbooks)
DB2 Information Integrator And Websphere Portal Server: A Synergistic Solution (IBM Redbooks)

Portals provide users with a single point of access to multiple types of information and applications through a Web interface. IBM WebSphere Portal for Multiplatforms is one of the industries’ most comprehensive portal offerings. It contains a wide range of portal technologies that help you develop and maintain B2C, B2B, and B2E portals....

Digital Signal Processing: System Analysis and Design
Digital Signal Processing: System Analysis and Design

This new, fully-revised edition covers all the major topics of digital signal processing (DSP) design and analysis in a single, all-inclusive volume, interweaving theory with real-world examples and design trade-offs. Building on the success of the original, this edition includes new material on random signal processing, a new chapter on...

Asterisk Cookbook
Asterisk Cookbook

Asterisk has a wealth of features to help you customize your PBX to fill very specific business needs. This short cookbook offers recipes for tackling dialplan fundamentals, making and controlling calls, and monitoring channels in your PBX environment. Each recipe includes a simple code solution you can put to work immediately, along...

Implementing Cisco UCS Solutions
Implementing Cisco UCS Solutions

Cisco Unified Computer System is a powerful solution for data centers that can raise efficiency and lower costs. This tutorial helps professionals realize its full potential through a practical, hands-on approach written by two Cisco experts.

Overview

  • Learn about various Cisco UCS equipment options...
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Accelerated GWT: Building Enterprise Google Web Toolkit Applications
Accelerated GWT: Building Enterprise Google Web Toolkit Applications
Ajax is a web development technique that takes advantage of JavaScript to display and interact dynamically with information embedded into a web page. Its emergence has made it possible to create web applications that closely resemble their desktop–based brethren. With this exciting new ability came several challenges; not only did developers...
XNA 3.0 Game Programming Recipes: A Problem-Solution Approach (Expert's Voice in XNA)
XNA 3.0 Game Programming Recipes: A Problem-Solution Approach (Expert's Voice in XNA)
When Microsoft released XNA in December 2006, it immediately became clear that this new technology would have a major impact on the possibilities for game developers. XNA was designed from the ground up with ease of use in mind, while not sacrificing performance or capabilities to achieve this goal. As a bonus, any game you create in XNA for the PC...
unlimited object storage image
Result Page: 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy