Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fixing Windows XP Annoyances : How to Fix the Most Annoying Things About the Windows OS
Fixing Windows XP Annoyances : How to Fix the Most Annoying Things About the Windows OS

Windows XP is the most popular operating system on the planet--and the most annoying. From incomprehensible error messages to inexplicable crashes, from wonky wireless setups to just finding a file, Windows can make your computing life a nightmare. But thanks to Fixing Windows XP Annoyances, you...

Beginning RSS and Atom Programming
Beginning RSS and Atom Programming
RSS and Atom are specifications that give users the power to subscribe to information they want to receive and give content developers tools to provide continuous subscriptions to willing recipients in a spam-free setting. RSS and Atom are the technical power behind the growing millions of blogs on the Web. Blogs change the Web from a set of static...
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the expressed purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the...
Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM
Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM

With a focus on connectivity, clients, and unified messaging, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Paul Robichaux, a Microsoft MVP and popular author, you will:

  • Understand how Exchange Server 2013 works with previous...
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...

Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Black Hat: Misfits, Criminals, and Scammers in the Internet Age

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read...

Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.
...
SpamAssassin
SpamAssassin

Sys admins can field scores of complaints and spend months testing software suites that turn out to be too aggressive, too passive, or too complicated to setup only to discover that SpamAssassin (SA), the leading open source spam-fighting tool, is free, flexible, powerful, highly-regarded, and remarkably effective. The...

Easy Computer Basics, Windows 7 Edition
Easy Computer Basics, Windows 7 Edition

See it done. Do it yourself. It’s that Easy! Easy Computer Basics, Windows 7 Edition  teaches you the fundamentals to help you get the most from your computer hardware and software. Fully illustrated steps with simple instructions guide you through each task, building the skills you need to perform the most common computer tasks....

Mobile Marketing: Finding Your Customers No Matter Where They Are
Mobile Marketing: Finding Your Customers No Matter Where They Are

I believe that mobile marketing is the marketing of the future. My name is Cindy Krum, and I am the author of Mobile Marketing: Finding Your Customers No Matter Where They Are. This book is intended to be a comprehensive guide for marketers and anyone who wants a clearer understanding of how they can integrate mobile marketing with their...

Inbound Marketing: Get Found Using Google, Social Media, and Blogs
Inbound Marketing: Get Found Using Google, Social Media, and Blogs

Stop pushing your message out and start pulling your customers in

Traditional "outbound" marketing methods like cold-calling, email blasts, advertising, and direct mail are increasingly less effective. People are getting better at blocking these interruptions out using Caller ID, spam protection, TiVo,
...

Internet Forensics
Internet Forensics

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to ...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy