 |
|
 Droid 2 For Dummies (Computer/Tech)
Don’t be fooled: Just because the Droid 2 is a smartphone doesn’t mean
that it’s harboring some form of insidious intelligence. There’s no alien
brain in the device. It isn’t going to take over the world, though it can intimidate
you — that is, until you understand and accept that it’s your... |  |  Windows 7 Inside Out, Deluxe Edition
By some measures, Windows 7 sets a new standard for usability. It needs less out-of-the-box tweaking and troubleshooting than any Windows version we’ve ever used. The arrangement of folders and files in Windows Explorer, basic system security, User Account Control settings, and numerous other default configuration options are... |  |  WordPress 3 Ultimate Security
Most likely, today, some hacker tried to crack your WordPress site, its data and
content. Maybe that was just a one-off from some bored kid. Just as likely, it was an
automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it
was both.
Whether you've been successfully hacked already, else... |
|
|
 State of the World 2009: Into a Warming World (State of the World)
A comprehensive guide to global warming and the steps we must take to combat it.
The evidence continues to mount: melting ice caps, rising temperatures, increasingly frequent natural disasters. As the devastating effects of global warming come into sharper focus, societies must work to both mitigate greenhouse gas... |  |  Italy For Dummies
For Dummies Travel guides are the ultimate user-friendly trip planners, combining the broad appeal and time-tested features of the For Dummies series with up-to-the-minute advice and information from the experts at Frommer’s.
-
Small trim size for use on-the-go
-
Focused coverage of only the best hotels...
|  |  Network Security Auditing (Networking Technology: Security)
Mention the word audit to IT professionals and you will probably see their eyes glaze over as
they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run
ning around and pointing out all of the things they have done wrong to their manager. The
purpose of a security audit is not to place blame or pick... |
|
 GIMP Bible
The ultimate reference and guide to the GNU image manipulation program
GIMP is a free, Photoshop-like image manipulation program, and as its use grows, so does the demand for detailed instruction on how to get the very most out of it. GIMP Bible is the most comprehensive and current independent GIMP reference... |  |  Automatic Ambiguity Resolution in Natural Language Processing
Natural language processing is often called an "Al-complete" task, in the sense that in order to truly process language (i.e. to comprehend, to translate, to generate) full understanding is required, which is itself the ultimate goal of Artificial Intelligence. For those who seek solutions to practical problems, this is not a... |  |  VMware vSphere PowerCLI Reference: Automating vSphere Administration
The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something... |
|
| Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 |