The Xbox might be described as a powerful, proprietary PC that has been customized exclusively for running games. This book will help you to maximize the potential of your Xbox video game console by showing you how to modify your Xbox in various ways. You will learn how to disassemble your Xbox, right down to the motherboard, and you will...
We make images to communicate. The ultimate measure of the quality of our images is how well they communicate information and ideas from the creator’s mind to the perceiver’s mind. The efficiency of this communication, and the quality of our image, depends on both what we want to say and to whom we intend to say it. I believe that...
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
PHP & MySQL are the most widely used open source database and scripting technologies on the Web today. As a Web developer you can demand a lot more $$$ for your time if you can master PHP & MySQL.
Build Your Own Database Driven Website Using PHP & MySQL is a practical hands-on guide to...
Keep your network safe from security disasters with a dependable recovery strategy
Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.
In the information-packed pages of this book, Annlee Hines shares her...
This book analyzes network-based services using a new framework that links market uncertainty to the choice between distributed management structure and centralized management structure. It explores communications technology and suggests how investors, managers, service providers, and consultants can make better decisions about...
New York Times computer columnist David Pogue has just updated his bestselling Mac OS X:The Missing Manual! And once again, he applies his scrupulous objectivity to this exciting new operating system, revealing which new features work well and which do not. With new material on almost every page, this second edition offers a wealth of...
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Thoroughly updated with new examples and the latest research findings, this new edition also boasts updates case studies in each chapter, taken from recent editions of the Financial Times, that illustrate the practical implications of the issues raised.
This book is about creating and sustaining superior performance in the...
The bane of my existence has always been the management (or
in my case, the mismanagement) of time. I have struggled with
finding time to ‘‘do it all.’’ In high school and college, I was notorious
for pulling all-nighters to study or write papers (a habit I have
not outgrown). When I started my career, I...
A visual way to easily access the strategies and tactics in Book Yourself Solid
Learning new concepts is easier when you can see the solution. Book Yourself Solid Illustrated, a remarkable, one-of-a-kind work of art, transforms the Book Yourself Solid system into a more compelling and...
This book is being written in a small village in Sachsen-Anhalt in Germany, among other places. I live in this village. There is no access to DSL here; there are no public WLAN hotspots, no UMTS, no large companies and no city noise.
My work consists of activities like lecturing, advising, listening, testing and trying, programming,...