Home | Amazing | Today | Tags | Publishers | Years | Search 
Encyclopedia of Virtual Communities and Technologies
Encyclopedia of Virtual Communities and Technologies
Advances in computer and telecommunications technologies during the past several decades, have facilitated the creation of virtual communities and organizations throughout the world. As the growth in virtual communities accelerates, researchers are facing new challenges to learn about the latest of research and practices in this fast growing filed....
Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost...
Modeling and Analysis of Telecommunications Networks
Modeling and Analysis of Telecommunications Networks
A timely and relevant analysis of today's complex call models
In today's world of ever-expanding telecommunications options, here is an advanced-level text that covers the mathematical methods used in the analysis of modern telecom networks, with emphasis on a variety of call models such as quality of service (QoS) in
...
The Healthy PC: Preventive Care and Home Remedies for Your Computer
The Healthy PC: Preventive Care and Home Remedies for Your Computer

Keep Your PC Running Smoothly--Without Spending a Lot of Money!

Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely...

MacBook for Dummies
MacBook for Dummies
Work with networks, share access, troubleshoot, and more
Enjoy music and videos, cruise the Web, and even do some work -- from anywhere!
Not only can your MacBook do everything a desktop computer can, it can do some things better! Find out how to use the cool iLife(r) applications, like iPhoto,(r) iMovie,,(r) and iTunes,(r) plus gobs
...
Internet Television
Internet Television
Internet television is the quintessential digital convergence medium, putting together television, telecommunications, the Internet, computer applications, games, and more. It is part of a historic move from individualized narrowband capacity, measured by kilobits per user, to one of broadband with a capacity of megabits per user. This move will...
Building PDA Databases for Wireless and Mobile Development
Building PDA Databases for Wireless and Mobile Development
Learn how to build databases on personal digital devices to be used with PDA applications

Several years ago, the business community accepted the Internet as a viable solution to extending the corporate environment. Today, there is another movement towards enhancing this methodology–– empowering mobile wireless business users with...

Interface Oriented Design
Interface Oriented Design
Interface-Oriented Design explores how you can develop software with interfaces that interact with each other. We’ll look at techniques for breaking down solutions into these interacting interfaces and then for determining appropriate implementations for these interfaces to create well-structured...
Nonprofit Essentials: The Capital Campaign
Nonprofit Essentials: The Capital Campaign
A thorough and practical overview of the process of planning and managing a capital campaign
"I have not come across a better book on the overall strategy and techniques necessary for the planning and implementation of a capital campaign. Ms. Walker covers all of the bases in a clear and concise manner that will benefit many
...
Mission Critical Internet Security
Mission Critical Internet Security
The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This...
Build Your Own Database Driven Website Using PHP & MySQL
Build Your Own Database Driven Website Using PHP & MySQL
This book is aimed at intermediate and advanced Web designers looking to make the leap into server-side programming. You’ll be expected to be comfortable with simple HTML, as I’ll make use of it without much in the way of explanation. No knowledge of JavaScript is assumed or required, but if you do know JavaScript, you’ll find it...
The Official Ubuntu Book
The Official Ubuntu Book
Ubuntu is a complete, free operating system that emphasizes community support and ease of use while refusing to compromise on speed, power, and flexibility. It's Linux for human beings--designed for everyone from computer novices to experts. Ubuntu is the most in-demand Linux distribution, and this official guide will get you up and running...
Result Page: 709 708 707 706 705 704 703 702 701 700 699 698 697 696 695 694 693 692 691 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy