Home | Amazing | Today | Tags | Publishers | Years | Search 
SCJA Sun Certified Java Associate Study Guide (Exam CX-310-019) (Certification Press)
SCJA Sun Certified Java Associate Study Guide (Exam CX-310-019) (Certification Press)
The best fully integrated study system available for Exam CX-310-019

With hundreds of practice questions and hands-on exercises, SCJA Sun Certified Java Associate Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.

  • 100% complete coverage of...
Marketing Through Search Optimization: How to be found on the web
Marketing Through Search Optimization: How to be found on the web
Search engine placement has become a key task for those engaged in website marketing because:

* Good positioning in search engines/directories dramatically increases visitor traffic.
* Optimizing search engine ranking is the most important and cost effective way of marketing a website.
* Customers use search engines more
...
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure....
CRC Handbook of Modern Telecommunications, Second Edition
CRC Handbook of Modern Telecommunications, Second Edition

Addressing the most dynamic areas of the ever-changing telecommunications landscape, this new edition of the bestselling CRC Handbook of Modern Telecommunications once again brings together the top minds and industry pioneers in wireless communication networks, protocols, and devices.

In addition to new discussions of...

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

WordPress MU 2.8: Beginner's Guide
WordPress MU 2.8: Beginner's Guide
WordPress MU enables you to build a complete, professional blog network. Each user gets their own blog, and can choose their favorite templates and plug-ins, and develop their own content. WordPress MU powers some of the largest blog networks in the world, including the mighty WordPress.com - home to thousands of bloggers.

This book will
...
Google Advertising Tools: Cashing in with AdSense and AdWords (Animal Guide)
Google Advertising Tools: Cashing in with AdSense and AdWords (Animal Guide)
With this book, you'll learn how to take full advantage of Google AdWords and AdSense, the sophisticated online advertising tools used by thousands of large and small businesses. This new edition provides a substantially updated guide to advertising on the Web, including how it works in general, and how Google's advertising programs in...
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

Design, Measurement and Management of Large-Scale IP Networks: Bridging the Gap Between Theory and Practice
Design, Measurement and Management of Large-Scale IP Networks: Bridging the Gap Between Theory and Practice
Designing efficient Internet Protocol (IP) networks and maintaining them effectively poses a range of challenges, but in this highly competitive industry it is crucial that these are overcome. Weaving together theory and practice, this title sets out the design and management principles of large-scale IP networks, and the need for tasks to be...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld

During his campaign for reelection in 1996, the Internet-savvy President Bill Clinton used the slogan “Building a Bridge to the 21st Century.” It turns out that the bridge is operated and maintained in cyber form, and that malevolent actors can practice their black arts to disrupt or destroy the bridge, its cyber traffic, and all...

The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
My New Iphone: 52 Simple Projects to Get You Started
My New Iphone: 52 Simple Projects to Get You Started

You finally did it-you bought the gizmo that everyone's talking about. Maybe you've already figured out how to play music or make phone calls, but then what?

How does the voicemail work? And that keyboard? What about all of those cool apps-which ones do you need, and how do you get them? You need a book like My New iPhone...

Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy