 |
|
|
|
 Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective
The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which
organizations and individuals share information. Developed out of necessity during the cold
war, the Internet was created as a means to help governmental institutions and collegiate
institutions send documents and research materials electronically... |  |  WordPress 3 Ultimate Security
Most likely, today, some hacker tried to crack your WordPress site, its data and
content. Maybe that was just a one-off from some bored kid. Just as likely, it was an
automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it
was both.
Whether you've been successfully hacked already, else... |  |  |
|
 Covert Java: Techniques for Decompiling, Patching, and Reverse EngineeringAs a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling,... |  |  Secrets of the Playstation PortableWith over 13 million shipped, the Sony PlayStation Portable, or PSP, is one of the fastest selling game consoles in history. In this essential guide, gaming expert Joel Durham, Jr. shows readers how to get the most out of this revolutionary handheld game console. After an initial tour around the interface, Joel will introduce the readers to the... |  |  Beginning OpenGL Game Programming (Game Development Series)This book provides new game programmers with a complete introduction to 3D game programming using OpenGL. All of the basic elements of OpenGL as it applies to game development are covered.
Provides new game programmers with a complete introduction to 3D game programming using OpenGL. Makes this popular development environment... |
|
| Result Page: 8 7 6 5 4 3 2 1 |