Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microformats: Empowering Your Markup for Web 2.0
Microformats: Empowering Your Markup for Web 2.0
Microformats burst onto the scene a couple of years ago and are fast becoming an essential tool for all professional web designers and developers. Imagine being able to integrate all of your web-based contact details, tagged articles, and geographical information seamlessly in web and desktop applications, without having to add anything extra to...
Cryptography for Developers
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent
...
Essential Mathematics for Games and Interactive Applications: A Programmer's Guide
Essential Mathematics for Games and Interactive Applications: A Programmer's Guide
"Even though I've worked with these systems for years, I found new ways of looking at several topics that make them easier to remember and use. For someone new to 3D programming, it is extremely usefulit gives them a solid background in pretty much every area they need to understand." Peter Lipson, Toys for Bob, Inc.

Based on
...
The New Language of Business: SOA & Web 2.0
The New Language of Business: SOA & Web 2.0
In The New Language of Business, senior IBM executive Sandy Carter demonstrates how to leverage SOA, Web 2.0, and related technologies to drive new levels of operational excellence and business innovation.

Writing for executives and business leaders inside and outside IT, Carter explains why flexibility and responsiveness...

A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
Everyday life would be easier if we could simply talk with machines instead of having to program them. Before such talking robots can be built, however, there must be a theory of how communicating with natural language works. This requires not only a grammatical analysis of the language signs, but also a model of the cognitive agent, with...
Professional Team Foundation Server
Professional Team Foundation Server

This book is for project managers, IT administrators, and anyone whose role consists of administering Team Foundation Server on a daily basis, running a software project, setting up users, or handling security.

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
Sit down at the keyboard and cinch that deal! Press the send button and get the account!

Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...

MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

Access 2007 VBA Programmer's Reference
Access 2007 VBA Programmer's Reference
Access 2007 VBA Programmer's Reference

Written by Access MVPs and Microsoft Access testers, this resource will give you the tools to leverage Access 2007's built-in functionality and VBA in order to build more dynamic applications. It explores all aspects of VBA programming for Access and describes the latest innovations. You'll also find...

People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
The business environment has changed. Sharper competition requires organizations to exhibit greater effectiveness in their operations and services and faster creation of new products and servicesall hallmarks of the knowledge economy. Up until now, most of the knowledge management literature has focused on technology, systems, or culture. This book...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy