Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft SharePoint 2010 Administration: Real World Skills for MCITP Certification and Beyond (Exam 70-668)
Microsoft SharePoint 2010 Administration: Real World Skills for MCITP Certification and Beyond (Exam 70-668)

SharePoint 2010 is a complex product, and a diverse skill set is required to administer it. You have to be part database administrator (DBA), part web developer, part network administrator, and part server administrator to fully wrap your mind around this product. This book was written to help you do just that.

...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Fundamentals of ActionScript 3.0: Develop and Design
Fundamentals of ActionScript 3.0: Develop and Design

Welcome to ActionScript. Over the next several chapters, you’ll be introduced to one of the most versatile programming languages to create web applications for the browser, desktop applications, and mobile apps for multiple platforms. For years the Flash Platform has provided people with the most powerful set of...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Contributions in Analytic and Algebraic Number Theory: Festschrift for S. J. Patterson
Contributions in Analytic and Algebraic Number Theory: Festschrift for S. J. Patterson

The text that comprises this volume is a collection of surveys and original works from experts in the fields of algebraic number theory, analytic number theory, harmonic analysis, and hyperbolic geometry. A portion of the collected contributions have been developed from lectures given at the "International Conference on the Occasion of...

Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)

Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness.  This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

ASP.NET jQuery Cookbook
ASP.NET jQuery Cookbook

The jQuery library has become increasingly popular with web application developers because of its simplicity and ease of use. The library is supported by an active community of developers and has grown significantly over the years after its inception in 2006 by John Resig. Using this library eases complicated tasks and adds to the interactive...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)

Many years ago, when I had to learn C overnight to make a living as a programmer (this was before C++), I would have given half my salary to find a mentor, a person would say, “Here are the potholes in the road...errors that you are sure to make in learning C. And here’s how to steer around them.” Instead, I had to...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

Microsoft Windows Server Administration Essentials
Microsoft Windows Server Administration Essentials

The core concepts and technologies you need to administer a Windows Server OS

Administering a Windows operating system (OS) can be a difficult topic to grasp, particularly if you are new to the field of IT. This full-color resource serves as an approachable introduction to understanding how to install a server, the various...

Result Page: Previous 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy