Home | Amazing | Today | Tags | Publishers | Years | Search 
Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)
Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)

Let’s begin with a quick glimpse into a typical day at a company:

There you are at your desk, wanting to talk with your colleague Steve in another office about a new project you need his help on. You turn to your laptop, switch to a software program, and look at Steve’s presence info. The little bubble next to...

Head First WordPress: A Brain-Friendly Guide to Creating Your Own Custom WordPress Blog
Head First WordPress: A Brain-Friendly Guide to Creating Your Own Custom WordPress Blog

Whether you're promoting your business or writing about your travel adventures, Head First WordPress will teach you not only how to make your blog look unique and attention-grabbing, but also how to take advantage of WordPress platform's more complex features to make your website work well, too.

...

Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

Instant LinkedIn Customization How-to
Instant LinkedIn Customization How-to

LinkedIn is a great social media platform which helps you connect with people online professionally. The website is very user friendly and this book itself covers the most important tools for job seekers and professionals as a whole with guaranteed results. Once you learn the basics from this book, you can master and explore the areas you...

Hack Proofing ColdFusion
Hack Proofing ColdFusion

In preparation for the creation of this book I spent a weekend at my home in Massachusetts setting up one of my personal computers to be a testing server. My home is serviced by AT&T and we have a high-speed modem with a fixed IP number.This, combined with the installation of some new software, made for a very fun weekend of tweaking and...

Deploying Microsoft Forefront Threat Management Gateway 2010
Deploying Microsoft Forefront Threat Management Gateway 2010

When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,...

Google Power Search
Google Power Search

If you’re like me, you use Google every day to find things—news, technical support, events, tips, research documents, and more. Were you to master Google’s powerful search refinement operators and lesser-known features, over a year’s time you could save days scouring over irrelevant results.

...

Google - Illustrated Essentials (Illustrated Series)
Google - Illustrated Essentials (Illustrated Series)

Welcome to GoogleTM—Illustrated Essentials. If this is your first experience with the Illustrated series, you’ll see that this book has a unique design: each skill is presented on two facing pages, with steps on the left and screens on the right. The layout makes it easy to digest a skill without having to read a lot...

Liferay Beginner's Guide
Liferay Beginner's Guide

Liferay portal is a leading horizontal portal product, written in Java. It has the power to provide the intranets and extranets of large corporations. Liferay will allow you to build your company's portal quickly, efficiently, and in a custom way to suit the needs of your corporation.

Liferay Beginner's Guide will show you...

The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
A single hype is not enough to change the world. But multiple hypes together can change it as long as they are part of a bigger trend.

This book discusses more than one hyped technology: cloud computing, NoSQL, and HTML5. The technologies in this book combine well with other hyped technologies: functional
...
Developing Web Applications with Haskell and Yesod
Developing Web Applications with Haskell and Yesod

This fast-moving guide introduces web application development with Haskell and Yesod, a potent language/framework combination that supports high-performing applications that are modular, type-safe, and concise. You’ll work with several samples to explore the way Yesod handles widgets, forms, persistence, and RESTful content....

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy