|
|
|
|
|
Joomla! Start to Finish: How to Plan, Execute, and Maintain Your Web Site
Everything you need to know to plan and maintain a Joomla! site
Joomla! offers powerful functionality and ease of configuration, making it an immensely popular open source content management system. However, far more than simply downloading and installing Joomla! is required in order to create a dynamic web site. This book... | | Linux All-in-One Desk Reference For Dummies (Computer/Tech)8 books in 1— your key to success with Linux!
Your one-stop guide to working with various Linux distributions
Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is... | | Deploying Windows 2000 with Support ToolsVisually, Windows 2000 is similar to previous versions of Windows. Its extensive new functionality, the overriding goal of which is to reduce an organization's "total cost of ownership," however, makes the system administrator's life easier. This translates to quicker software installation, more efficient management, and easier... |
|
Extreme Exploits: Advanced Defenses Against Hardcore HacksProtect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses... | | Deploying Cisco Voice over IP SolutionsIf you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in... | | Security for Wireless Ad Hoc NetworksWireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... |
|
Inside Ole (Microsoft Programming Series)In writing this book, I assumed that readers are familiar with the Windows API (primarily the Win32 API) because OLE itself, unlike Win32, is not a technology for writing a complete application (although you could build one out of OLE components). I don't describe how to use Windows API functions, nor do I describe any of the intricate details of... | | Principles of Model CheckingOur growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twenty years is model checking, which systematically (and automatically) checks whether a model of a... | | Logic Programming and Nonmonotonic Reasoning: 9th International Conference, LPNMR 2007, Tempe, AZ, USA, May 15-17, 2007This book constitutes the refereed proceedings of the 9th International Conference on Logic Programming and Nonmonotonic Reasoning, LPNMR 2007, held in Tempe, AZ, USA in May 2007.
The 18 revised full papers, 5 revised poster papers, and 7 system descriptions presented together with 2 invited papers were carefully reviewed and selected for... |
|
|
Result Page: 684 683 682 681 680 679 678 677 676 675 674 673 672 671 670 669 668 |