Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Russian For Dummies (Language & Literature)
Russian For Dummies (Language & Literature)

Covers common expressions, conversations, and cultural notes

Your fun and friendly guide to communicating in Russian

Whether you're a student, a traveler, or a businessperson, or if you just want to speak basic Russian, you'll find this book packed with practical lessons...

Linux For Dummies, 6th Edition
Linux For Dummies, 6th Edition
Welcome to the fascinating world of open source software that is Linux. In this book, I introduce you to the wonders of the Linux operating system, originally created as a labor of love by Linus Torvalds in the early 1990s. My goal is to initiate you into the rapidly growing ranks of Linux users and enthusiasts busily rewriting the rules for the...
Microsoft ADO.NET Step by Step
Microsoft ADO.NET Step by Step
Learn to use the ADO.NET model to expand on data-bound Windows and
Web Forms, as well as how XML and ADO.NET intermingle.

ADO.NET is the data access component of Microsoft’s new .NET Framework. Microsoft
bills ADO.NET as “an evolutionary improvement” over previous versions of ADO, a claim
that has been
...
Debugging the Development Process
Debugging the Development Process
This book might make Microsoft sound bad.

At least that's one of the concerns I had about telling so many Microsoft war stories. I considered softening and smoothing over some of the stories, or leaving them out altogether, but apart from changing people's names, I decided to keep this book and its examples grounded in reality so that it
...
Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Proven guerrilla marketing tactics specifically designed for consultants

Jay Conrad Levinson’s Guerrilla Marketing revolutionized the way marketers do business by defying the conventional wisdom that effective marketing means spending big bucks. He devised highly successful marketing strategies that rely on creativity, imagination, and...

The Digital Photography Book, Volume 3
The Digital Photography Book, Volume 3

I know what you’re thinking: “If this is Part 2, where is Part 1?” Well, Part 1 is actually Chapter One back in volume 2. “Wait a darn minute—you’re pulling that old ‘bait and switch’ scam, right?” No, a bait-and-switch scam is where you see an advertisement for a washer and dryer for a...

Plone 3 for Education
Plone 3 for Education

Why do so many schools have terrible websites? Talk to the people in charge, and you rarely find incompetence. On the contrary, the web team is often the first to express dissatisfaction, but their hands are tied by some combination of these problems:

• The webmaster bottleneck. Everyone is busy. If editing web content is any harder...

Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000

Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also,...

Database Programming Languages: 11th International Symposium, DBPL 2007, Vienna, Austria, September 23-24, 2007
Database Programming Languages: 11th International Symposium, DBPL 2007, Vienna, Austria, September 23-24, 2007
This volume contains the proceedings of the 11th International Symposium on Database Programming Languages (DBPL 2007), held in Vienna, Austria, on September 23–24, 2007. DBPL 2007 was one of 15 meetings co-located with VLDB (the International Conference on Very Large Data Bases).

DBPL continues to present the very best work at the
...
Model Checking Software
Model Checking Software
This book constitutes the refereed proceedings of the 11th International SPIN workshop on Model Checking Software, SPIN 2004, held in Barcelona, Spain, in April 2004.

The 19 revised full papers presented together with the abstracts of an invited talk and 2 tutorials were carefully reviewed and selected from 48 submissions. The papers are...

Eleventh Hour Security+: Exam SY0-201 Study Guide
Eleventh Hour Security+: Exam SY0-201 Study Guide

This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours. ...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy