Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Writing Secure Code, Second Edition
Writing Secure Code, Second Edition

If you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building...

Joel on Software
Joel on Software

This is a selection of essays from the author's Web site, http://www.joelonsoftware.com. Joel Spolsky started the web log in March 2000 in order to offer his insights, based on years of experience, on how to improve the world of programming. His extraordinary writing skills, technical knowledge, and caustic wit have made him a programming guru....

Mastering Mambo: E-Commerce, Templates, Module Development, SEO, Security, and Performance
Mastering Mambo: E-Commerce, Templates, Module Development, SEO, Security, and Performance
If you type "Mambo" into a search engine, you get a ton of hits. Testing this with Google
resulted in almost six million references. But only some of these concerned themselves with the Afro-Cuban style of music and dance made popular by the movie Dirty Dancing. Most lead to one of today's most popular content management systems,
...
Windows Server 2003 Pocket Administrator
Windows Server 2003 Pocket Administrator
Twenty years ago, when most computers were mainframes
or minicomputers, operators and administrators had
scheduled, specific tasks they needed to perform on an
ongoing basis. Each time a task was performed, they had
to make note of the time and write their initials in a
logbook to demonstrate when the task was performed...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Hacking the PSP: Cool Hacks, Mods, and Customizations for the Sony Playstation Portable
Hacking the PSP: Cool Hacks, Mods, and Customizations for the Sony Playstation Portable
You hold in your hand the Holy Grail for PSP aficionados—300 pages of ways to have even more fun with that little handheld powerhouse than the manufacturer intended. Use it as a hard drive. Surf the Web wirelessly. Play your own movies in the palm of your hand. Build your own battery pack. Run homebrew apps. And we're just getting started....
Adobe Flex 2: Training from the Source
Adobe Flex 2: Training from the Source
Part of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus...
Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

.Mac with iWeb, Second Edition (Visual QuickStart Guide)
.Mac with iWeb, Second Edition (Visual QuickStart Guide)
Need to learn what’s new in .Mac fast? Try a Visual QuickStart!

This best-selling reference’s visual format and step-by-step, task-based instructions will have you up and running with .Mac in no time. In this completely updated edition of our best-selling guide to .Mac leading software application expert
...
Agent-Oriented Information Systems: 5th International Bi-Conference Workshop, AOIS 2003, Melbourne, Australia
Agent-Oriented Information Systems: 5th International Bi-Conference Workshop, AOIS 2003, Melbourne, Australia
This book constitutes the thoroughly refereed post-proceedings of the 5th International Bi-Conference Workshop on Agent-Oriented Information Systems, held in Melbourne, Australia in July 2003 at AAMAS 2003 and in Chicago, IL, USA in October 2003 at ER 2003.

The revised full papers presented were carefully selected during two rounds of reviewing...

Microsoft Outlook 2007 Bible
Microsoft Outlook 2007 Bible
Discover all the ways Outlook can make your life easier

Outlook has been called the Swiss army knife of applications, and with good reason. In one handy package, you get the tools you use constantly—e-mail, a calendar and appointment book, a contacts list, a to-do list, and more. Learn to use them together, and you have a sophisticated...

Create!: The No Nonsense Guide to Photoshop Elements 2
Create!: The No Nonsense Guide to Photoshop Elements 2
Because Your Computer Should Improve Your Life, Not Complicate It

No Nonsense Guides are here. With a plainspoken approach, these books are inexpensive starters that are light on idle chat and heavy on practical advice. They're lean and mean and stripped down to fighting weight, so you'll get from point A to point Z with instruction...

unlimited object storage image
Result Page: 832 831 830 829 828 827 826 825 824 823 822 821 820 819 818 817 816 815 814 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy