Home | Amazing | Today | Tags | Publishers | Years | Search 
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
If this book is to succeed and help readers, its cardinal virtue must be to provide
a simple reference text. It should be an essential addition to an information
security library. As such it should also serve the purpose of being a quick
refresher for terms the reader has not seen since the days when one attended a
computing
...
Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux
Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux

The Ubuntu distribution simplifies Linux by providing a sensible collection of applications, an easy-to-use package manager, and lots of fine-tuning, which make it possibly the best Linux for desktops and laptops. Readers of both Linux Journal and TUX Magazine...

Java and XSLT (O'Reilly Java)
Java and XSLT (O'Reilly Java)
Java and Extensible Stylesheet Language Transformations (XSLT) are very different
technologies that complement one another, rather than compete. Java's strengths are portability,
its vast collection of standard libraries, and widespread acceptance by most companies. One
weakness of Java, however, is in its ability to process text.
...
Google Search and Tools in a Snap (Sams Teach Yourself)
Google Search and Tools in a Snap (Sams Teach Yourself)

These days, nobody really wants to learn everything there is about a product like Google Tools. And even if you did, who has the time to endlessly tinker and play with it until you figure everything out? You just want a book that will quickly show you how to do things with Google Tools, like perform power searches, find pictures...

Autonomy Oriented Computing : From Problem Solving to Complex Systems Modeling (Multiagent Systems, Artificial Societies, and Simulated Organizations)
Autonomy Oriented Computing : From Problem Solving to Complex Systems Modeling (Multiagent Systems, Artificial Societies, and Simulated Organizations)
With the advent of computing, we are fast entering a new era of discovery
and opportunity. In business, market researchers will be able to predict the potential
market share of a new product on-the-fly by synthesizing news reports,
competitor analysis, and large-scale simulations of consumer behavior. In life
and material
...
PCs For Dummies Quick Reference (Computer/Tech)
PCs For Dummies Quick Reference (Computer/Tech)
Fast answers to frequently asked questions

All the PC essentials at your fingertips!

If you like your answers quick and your information up-to-date, look no further. This concise, superbly organized reference walks you through setting up a PC, connecting all the parts, using programs, organizing your stuff, storing things on disk,...

Sensor Technology Handbook
Sensor Technology Handbook
The first decade of the 21st century has been labeled by some as the “Sensor Decade.”
With a dramatic increase in sensor R&D and applications over the past 15 years, sensors
are certainly poised on the brink of a revolution similar to that experienced in
microcomputers in the 1980s. Just in automobiles alone, sensing
...
Mastering Windows XP Home Edition
Mastering Windows XP Home Edition
The Only Windows XP Home Edition Resource You Need—Now Completely Updated

Here's the insider knowledge you need to maximize Microsoft's powerful home operating system, whether you're moving straight to XP or upgrading from Windows 98 or Me. This encyclopedic guide delivers full coverage of
...
Red Hat Fedora Linux 2 All-in-One Desk Reference For Dummies
Red Hat Fedora Linux 2 All-in-One Desk Reference For Dummies
9 books in 1– one great price for nine handy, quick reference guides!

Your one-stop guide to the latest release of this popular Linux distribution

Get ready to tip your hat to the latest version of Fedora! From installing Fedora on your PC and using OpenOffice.org to securing your system and setting up servers, the nine...

NetBeans(TM) IDE Field Guide: Developing Desktop, Web, Enterprise, and Mobile Applications (2nd Edition)
NetBeans(TM) IDE Field Guide: Developing Desktop, Web, Enterprise, and Mobile Applications (2nd Edition)

The Only Complete Guide and Reference for NetBeans™ IDE 5.0

The award-winning NetBeans™ IDE eases all aspects of Java application development, incorporating a wide range of powerful features into one well-designed package. NetBeans IDE is consistently first in supporting the latest Java technologies for...

Hacking: The Art of Exploitation
Hacking: The Art of Exploitation
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.

Hacking is the art of creating problem solving, whether used to find an unconventional solution to...

STAMP 2 Communications and Control Projects
STAMP 2 Communications and Control Projects
CD-ROM WITH SOFTWARE, PHOTOS, SCHEMATICS, AND MORE!

EVERYTHING YOU NEED TO INCORPORATE THE STAMP II CONTROLLER INTO YOUR NEXT COMMUNICATIONS PROJECT

When it comes to adding power to complex electronic circuits, the BASIC STAMP II microprocessor is the standard against which all others are judged....

Result Page: 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy