|
|
Open Sources 2Open Sources 2.0 is a collection of insightful and thought-provoking essays from today's technology leaders that continues painting the evolutionary picture that developed in the 1999 book Open Sources: Voices from the Revolution .
... | | Wireless HacksThe popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.
... | | Integrating Excel and AccessThe Microsoft Office Suite is, in my opinion, the most useful set of applications in a corporate setting. Besides being easy to use and practically perfecting the "What-You-See-Is-What-You-Get" (WYSIWYG) display, the applications in Microsoft Office can work together to share information, produce reports, etc. The... |
|
Time Management for System Administrators
Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with requests for quick-fixes that... | | Understanding the Linux KernelIn order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited... | | Mac OS X Tiger: In a NutshellThe most popular and most complete desktop reference book on Mac OS X now covers Tiger!
Apple's Mac OS X operating system continues to capture the attention of consumers and programmers alike with its ability to run older Mac programs, classic Unix applications, and innovative open source... |
|
|
| | Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... | | Agile Estimating and Planning (Robert C. Martin Series)This book could have been called Estimating and Planning Agile Projects. Instead, it's called Agile Estimating and Planning. The difference may appear subtle, but it's not. The title makes it clear that the estimating and planning processes must themselves be agile. Without agile estimating and planning, we cannot have agile projects.... |
|
Result Page: Previous 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 Next |