Exploit the full power of the revolutionary Google Nexus One superphone
Nexus One is Google's answer to Apple’s iPhone and RIM's BlackBerry. Covering a range of how-to topics, from the most useful Nexus One features and tricks of the core applications, to techniques to get the...
The Bible series from Wiley Publishing, Inc. is designed for beginning, intermediate, and advanced
users. This book covers all the essential components of Excel and provides clear and practical
examples that you can adapt to your own needs.
In this book, I’ve tried to maintain a good balance between the basics that every...
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...
Youre upgrading to the 2007 Microsoft Office systemcongratulations! Now learn the tips and tricks to make Microsoft Office work for you. With this fun, easy-to-read guide, you get step by step instructions for tackling common productivity problems.
Have you ever seen a Smart Tag? If you use Microsoft Office XP or later,...
A practical guide on CSS (Cascading Style Sheets) for professionals and novices, that can be used both as a tutorial and read cover-to-cover or as a handy and practical reference book to common problems, solutions and effects. The 2nd edition is now full-color throughout and is completely updated and revised with the latest tips & tricks. ...
Yahoo! Web Analytics teaches readers how to collect data, report on that data, and derive useful insights using Yahoo!’s free Web analytics tool . This detailed resource from Yahoo!’s Director of Data Insights discusses the why of Web analytics as well as the how while revealing secrets and tricks not documented elsewhere. The...
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.
Overview
Understand Android security from kernel to the application layer
If you've ever wondered whether carrots improve your vision (they do) and why elephants have great memories, consult A Word to the Wise. You'll discover that it's never too late to learn from a proverb or an old wives' tale. This captivating book is a fascinating compilation of age-old expressions and...
With all books there is a “target” audience, and although the distinction between those suited and unsuited to this title is somewhat nebulous, I feel confident in advocating that readers wanting to learn more about DirectX and sensible user interface design, and who have a solid comprehension of Microsoft Visual C++, as well as a basic...