Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Build Your Own Web Site
Build Your Own Web Site

Stop dreaming and start building that Web site! This one-stop resource demystifies the process, showing you step-by-step how to plan for, construct, and publish your own Web site. Connect to a remote server, get a domain name, and gather content. Then, construct pages using a variety of tools. Learn to use pictures and graphics, format text,...

CRC Handbook of Thermal Engineering (Mechanical Engineering Handbook Series)
CRC Handbook of Thermal Engineering (Mechanical Engineering Handbook Series)
To be successful in the international marketplace, corporations must have access to the latest developments and most recent experimental data. Traditional handbooks of heat transfer stress fundamental principles, analytical approaches to thermal problems, and elegant solutions to classical problems. The CRC Handbook of Thermal Engineering is not a...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Mac OS X Unwired : A Guide for Home, Office, and the Road
Mac OS X Unwired : A Guide for Home, Office, and the Road
Mac OS X Unwired is a one-stop wireless information source for technically savvy Mac users. If you're considering wireless as an alternative to cable and DSL, or using wireless to network computers in your home, office, or on the road, this book will show you the full-spectrum view of wireless capabilities of Mac OS X, and how to get the most out...
AutoCAD 2009 & AutoCAD LT 2009 All-in-One Desk Reference For Dummies (Computer/Tech)
AutoCAD 2009 & AutoCAD LT 2009 All-in-One Desk Reference For Dummies (Computer/Tech)

9 books in 1 — your key to success with AutoCAD!

Your one-stop guide to creating great technical drawings using AutoCAD 2009

Nobody ever said AutoCAD was easy, which is why you need a book that is! These nine minibooks cover all the stuff you need to know to set up AutoCAD...

Inbound Marketing: Get Found Using Google, Social Media, and Blogs
Inbound Marketing: Get Found Using Google, Social Media, and Blogs

Stop pushing your message out and start pulling your customers in

Traditional "outbound" marketing methods like cold-calling, email blasts, advertising, and direct mail are increasingly less effective. People are getting better at blocking these interruptions out using Caller ID, spam protection, TiVo,
...

The Leap of Your Life: How to Redefine Risk, Quit Waiting For 'Someday,' and Live Boldly
The Leap of Your Life: How to Redefine Risk, Quit Waiting For 'Someday,' and Live Boldly

There’s a bold decision in your life you’ve been waiting to make, and every day passing by is a reminder of what hasn’t happened. Conveniently tucked in a box labeled ‘someday,’ the fear of the unknown has taken a grip on your life and put your dreams on hold.

Until now.

...
Beginning Visual C# 2005 Express Edition: From Novice to Professional
Beginning Visual C# 2005 Express Edition: From Novice to Professional

In the 90s, Microsoft did the impossible and released a programming tool that let everyone write programs to run on Windows. I was so excited about that tool, Visual Basic, that I wrote a series of books on it and introduced nearly a quarter of a million people all over the world to programming.

Now Microsoft has done it again with the...

Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Effective Programming: More Than Writing Code
Effective Programming: More Than Writing Code

ABOUT THE BOOK Jeff Atwood began the Coding Horror blog in 2004, and is convinced that it changed his life. He needed a way to keep track of software development over time - whatever he was thinking about or working on. He researched subjects he found interesting, then documented his research with a public blog post, which he could easily...

Mastering AutoCAD 2017 and AutoCAD LT 2017
Mastering AutoCAD 2017 and AutoCAD LT 2017
The bestselling guide to AutoCAD, updated and expanded for the AutoCAD 2017 release

Mastering AutoCAD 2017 and AutoCAD LT 2017 is the premier guide to the world's leading CAD program. With clear explanation, focused examples, and step-by-step instruction, this guide walks you through everything you need to...

Ontology Management: Semantic Web, Semantic Web Services, and Business Applications
Ontology Management: Semantic Web, Semantic Web Services, and Business Applications
Managing ontologies and annotated data throughout their life-cycles is at the core of semantic systems of all kinds.  Ontology Management, an edited volume by senior researchers in the field, provides an up-to-date, concise and easy-to-read reference on this topic.

This volume describes relevant tasks, practical...

unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy