|
|
|
|
Securing LINUX Step by StepThis guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,... | | Integrating Microelectronics into Gas Distribution
This volume contains papers presented at the first and second IGT symposia on microelectronics in the gas
industry. The first was held November 18–20, 1985, in Orlando, Florida. The second symposium was held
September 8–10, 1986, in Fontana, Wisconsin.
The purpose of these symposia was to disseminate information on... | | Professional iOS Database Application Programming
WITH THE INTRODUCTION OF THE IPHONE, Apple revolutionized the mobile computing market. The
iPhone transformed the mobile phone from a device that you could use to make calls, check e-mail,
and look up movie times into a computer that could run almost any type of application. Since the
iPhone’s release in 2007, developers have... |
|
|
| | | | Sams Teach Yourself KDE 1.1 in 24 HoursA step by step guide to using and developing KDE applications on Linux/UNIX systems, Sams Teach Yourself KDE 1.1 in 24 Hours teaches the fundamentals of KDE on various systems. Learn how to navigate the file manager and windows manager, get the most out of numerous tools and utilities, use KDE's wide base of applications, and more. This book also... |
|
HTML5 and CSS3 Transition, Transformation, and Animation (Open Source)
A handy guide to understanding Microdata, the new JavaScript APIs, and the new form elements in HTML5 and CSS3 along with transition, transformation, and animation using lucid code samples
Overview
-
Discover the semantics of HTML5 and Microdata
-
Understand the concept of the CSS3 Flexible Box...
| | Beginning Oracle Application Express 5
Whether you’re new to Oracle or an old hand who has yet to test the waters of APEX, Beginning Oracle Application Express 5 introduces the processes and best practices you’ll need to become proficient with APEX. The book shows off the programming environment, the utilities and tools available, and then continues by walking... | | Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... |
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |