Home | Amazing | Today | Tags | Publishers | Years | Search 
iOS 5 in the Enterprise (Develop and Design)
iOS 5 in the Enterprise (Develop and Design)

 

Those of you who have to deal with more than a handful of iPhones, iPads, or iPod Touches already know why you manage iOS devices. For everyone else, “manage” is not a short way to say “impose draconian control.” Managing devices on your network, including iOS devices,
...
The Power of Infographics: Using Pictures to Communicate and Connect With Your Audiences (Que Biz-Tech)
The Power of Infographics: Using Pictures to Communicate and Connect With Your Audiences (Que Biz-Tech)

Need to overcome information overload and get your message across? Infographics are your secret weapon. Using them, you can deliver knowledge and ideas visually, so your audiences can understand them quickly - and take action. In The Power of Infographics, Mark Smiciklas helps you understand how to...

Adobe Audition CS6 Classroom in a Book
Adobe Audition CS6 Classroom in a Book

Those creative professionals seeking the fastest, easiest, most comprehensive way to learn Adobe Audition CS6 choose Adobe Audition CS6 Classroom in a Book from the Adobe Creative Team at Adobe Press. The 16 project-based lessons in this book show readers step-by-step the key techniques for working in Audition CS6. Part 1...

Enterprise Software Delivery: Bringing Agility and Efficiency to the Global Software Supply Chain
Enterprise Software Delivery: Bringing Agility and Efficiency to the Global Software Supply Chain

Globalization, rapid technology churn, and massive economic shifts have made it more difficult than ever to deliver high-value enterprise software.

 

In Enterprise Software Delivery, IBM Distinguished Engineer Alan W. Brown guides...

Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks...

Apple Pro Training Series: Final Cut Pro X Advanced Editing
Apple Pro Training Series: Final Cut Pro X Advanced Editing

 

This book takes a hands-on approach to using the software. It’s divided into projects— based on footage on the accompanying DVD—that teach you advanced techniques as you work through the lessons. Every exercise is designed to get you editing and creating effects professionally
...
Mobilizing Web Sites: Strategies for Mobile Web Implementation (Develop and Design)
Mobilizing Web Sites: Strategies for Mobile Web Implementation (Develop and Design)
Whether it’s “mobile first” or “mobile later,” we are in the age of mobile computing and web browsing.

Don’t let your web sites get left behind. Mobile later is better than not going mobile at all! More importantly, it can be your first step toward mastering mobile web design.
...
The OS X Mountain Lion Pocket Guide (Peachpit Pocket Guide)
The OS X Mountain Lion Pocket Guide (Peachpit Pocket Guide)
A lot has happened since Apple introduced OS X a decade ago (then called “Mac OS X”). What started as an incomplete replacement for an established operating system has become not only the backbone of today’s powerful Mac computers, but also the foundation for the iPhone, iPad, iPod touch, and Apple TV. At one...
Information Trapping: Real-Time Research on the Web
Information Trapping: Real-Time Research on the Web
For a long time—and especially around 1994, when the World Wide Web was just getting its jumpstart—the Internet appeared to many as a vast pool of information just sitting in cyberspace. People who used the Internet for research “cast their nets” by entering queries into a search engine, and then pulled...
CCNP Security VPN 642-648 Quick Reference
CCNP Security VPN 642-648 Quick Reference

As a final exam preparation tool, the CCNP Security VPN 642-648 Quick Reference ...

CCNA Wireless (640-722 IUWNE) Quick Reference
CCNA Wireless (640-722 IUWNE) Quick Reference

As a final exam preparation tool, the CCNA Wireless (640-722 IUWNE) Quick Reference provides a concise review of all objectives on the new exams.  The short eBook provides readers with detailed,...

Result Page: 2082 2081 2080 2079 2078 2077 2076 2075 2074 2073 2072 2071 2070 2069 2068 2067 2066 2065 2064 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy