Home | Amazing | Today | Tags | Publishers | Years | Search 
Open Sources 2
Open Sources 2

Open Sources 2.0 is a collection of insightful and thought-provoking essays from today's technology leaders that continues painting the evolutionary picture that developed in the 1999 book Open Sources: Voices from the Revolution .

...
Wireless Hacks
Wireless Hacks

The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.

...
Integrating Excel and Access
Integrating Excel and Access

The Microsoft Office Suite is, in my opinion, the most useful set of applications in a corporate setting. Besides being easy to use and practically perfecting the "What-You-See-Is-What-You-Get" (WYSIWYG) display, the applications in Microsoft Office can work together to share information, produce reports, etc. The...

Time Management for System Administrators
Time Management for System Administrators

Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with requests for quick-fixes that...

Understanding the Linux Kernel
Understanding the Linux Kernel

In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited...

Mac OS X Tiger: In a Nutshell
Mac OS X Tiger: In a Nutshell

The most popular and most complete desktop reference book on Mac OS X now covers Tiger!

Apple's Mac OS X operating system continues to capture the attention of consumers and programmers alike with its ability to run older Mac programs, classic Unix applications, and innovative open source...

Absolute Beginner's Guide to Creating Web Pages
Absolute Beginner's Guide to Creating Web Pages

    Absolute Beginner's Guide to Creating Web Pages assumes that readers are true beginners - no prior Web page experience is necessary!

    This hands-on tutorial teaches readers the fundamentals of creating Web pages, along with more advanced ideas like message areas, chat, and e-commerce options...

Understanding Enterprise SOA
Understanding Enterprise SOA
This book is for anyone in the business world or in the public sector who needs to make sense of the new emerging standards for virtually all major information technology decisions. For business professionals, this book is meant to explain and clarify—in business terms—the way web services and SOA work in a business setting. For IT...
Handbook on the Knowledge Economy
Handbook on the Knowledge Economy
This fascinating Handbook defines how knowledge contributes to social and economic life, and vice versa. It considers the five areas critical to acquiring a comprehensive understanding of the knowledge economy: the nature of the knowledge economy; social, cooperative, cultural, creative, ethical and intellectual capital; knowledge and innovation...
Greasemonkey Hacks: Tips & Tools for Remixing the Web with Firefox (Hacks)
Greasemonkey Hacks: Tips & Tools for Remixing the Web with Firefox (Hacks)

Greasemonkey Hacks is an invaluable compendium 100 ingenious hacks for power users who want to master Greasemonkey, the hot new Firefox extension that allows you to write scripts that alter the web pages you visit. With Greasemonkey, you can create scripts that make a web site more usable,...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Agile Estimating and Planning (Robert C. Martin Series)
Agile Estimating and Planning (Robert C. Martin Series)
This book could have been called Estimating and Planning Agile Projects. Instead, it's called Agile Estimating and Planning. The difference may appear subtle, but it's not. The title makes it clear that the estimating and planning processes must themselves be agile. Without agile estimating and planning, we cannot have agile projects....
Result Page: Previous 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy