Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Head First WordPress: A Brain-Friendly Guide to Creating Your Own Custom WordPress Blog
Head First WordPress: A Brain-Friendly Guide to Creating Your Own Custom WordPress Blog

Whether you're promoting your business or writing about your travel adventures, Head First WordPress will teach you not only how to make your blog look unique and attention-grabbing, but also how to take advantage of WordPress platform's more complex features to make your website work well, too.

...

Windows 8.1: The Missing Manual (Missing Manuals)
Windows 8.1: The Missing Manual (Missing Manuals)

Windows 8.1 continues the evolution of the most radical redesign in Microsoft’s history. It combines the familiar Windows desktop with a new, touchscreen-friendly world of tiles and full-screen apps. Luckily, David Pogue is back to help you make sense of it—with humor, authority, and 500 illustrations.

The...

Doing Data Science: Straight Talk from the Frontline
Doing Data Science: Straight Talk from the Frontline

Now that people are aware that data can make the difference in an election or a business model, data science as an occupation is gaining ground. But how can you get started working in a wide-ranging, interdisciplinary field that’s so clouded in hype? This insightful book, based on Columbia University’s Introduction to...

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Degunking Windows
Degunking Windows

All Windows users know that their PCs slowly develop problems—nasty gunk build-up that plagues their PCs. Here are some of the common symptoms: your PC starts to run slower, your applications will crash without warning, you can’t easily find your files and folders, you start getting tons of spam, and you encounter a host of other...

Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
Computer Systems, Support, and Technology (Computer Science, Technology and Applications)
Computer Systems, Support, and Technology (Computer Science, Technology and Applications)
This book presents and discusses research in the study of computer science. Topics discussed include fuzzy logic in molecular computing; mobile database computing; learning methods for spam filtering; heterogeneous systems; nested relational database systems; advanced array processing techniques and systems and swarm intelligence....
MCTS Self-Paced Training Kit (Exam 70-236): Configuring Microsoft  Exchange Server 2007 (PRO-Certification)
MCTS Self-Paced Training Kit (Exam 70-236): Configuring Microsoft Exchange Server 2007 (PRO-Certification)
Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-236, the required exam for the new Microsoft Certified Technology Specialist (MCTS): Configuring Microsoft Exchange Server 2007 certification. This 2-in-1 kit includes the official Microsoft study guide plus practice tests on CD to help you assess your...
Running Linux
Running Linux

You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the...

Anti-Spam Measures: Analysis and Design
Anti-Spam Measures: Analysis and Design
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological...
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy