Home | Amazing | Today | Tags | Publishers | Years | Search 
PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

iPhoto 6: The Missing Manual
iPhoto 6: The Missing Manual

If you used iPhoto when it first came out, you'll remember the way it slowed to a crawl once you loaded it with about 2,000 photos. Compare that to this year's model: iPhoto 6 can handle as many as 250,000 images and still have the power to run a host of suped-up features. Its new software engine lets you make changes with a...

Configuring Sonicwall Firewalls
Configuring Sonicwall Firewalls
Every enterprise requires at least one firewall to provide the backbone for its network
security architecture. Firewalls are the core component of your network’s security.
The risks today have greatly increased, so the call for a stronger breed of firewall
has been made. In the past, simple packet-filtering firewalls allowing
...
Pragmatic Ajax: A Web 2.0 Primer
Pragmatic Ajax: A Web 2.0 Primer
This is a book about developing effective web applications. We’re not
going to dance around this issue. Underneath everything else, this
book is about XHTML, JavaScript, CSS, and standards that have been
around for almost a decade now. Not only do we admit this truth,
we embrace it. Just because these standards have been
...
Enterprise Integration with Ruby
Enterprise Integration with Ruby

Typical enterprises use dozens, hundreds, and sometimes even thousands of applications, components, services, and databases. Many of them are custom built in-house or by third parties, some are bought, others are based on open source projects, and the origin of a few--usually the most critical ones--is completely unknown.

A lot of...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Windows Forms in Action
Windows Forms in Action
Using many examples all on a common theme, this second edition of Windows Forms Programming with C# presents Windows application development in a step-by-step, easy to follow format. Written for beginner and intermediate programmers eager to get their hands dirty, the text covers fundamentals like labels, buttons, and tool strips, as well as...
Genetic Systems Programming: Theory and Experiences (Studies in Computational Intelligence)
Genetic Systems Programming: Theory and Experiences (Studies in Computational Intelligence)
Designing complex programs such as operating systems, compilers, filing systems, data base systems, etc. is an old ever lasting research area. Genetic programming is a relatively new promising and growing research area. Among other uses, it provides efficient tools to deal with hard problems by evolving creative and competitive solutions. Systems...
Trends in Functional Programming: Volume 5
Trends in Functional Programming: Volume 5
Covers all aspects of functional programming, both theoretical and practical, to provide a coherent overview of research's most recent developments. This book features: language design, proof and transformation, semantics and models, implementation, applications, type systems, parallelismand distribution, performance modelling and profiling,...
CISA Exam Prep: Certified Information Systems Auditor (ACM Press)
CISA Exam Prep: Certified Information Systems Auditor (ACM Press)
The CISA Exam Prep provides you with the market's most comprehensive and current material for passing the new CISA certification exam. Exam Prep's best-selling study methods feature chapter review questions, practice exams, exam alerts, notes, tips, and cautions. You'll also have exclusive access to online test...
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 (with a formal ISO/IEC designation ISO/IEC 14496) standardization was initiated in 1994 to address the requirements of the rapidly converging telecommunication, computer, and TV/film industries. MPEG-4 had a mandate to standardize algorithms for audiovisual coding in multimedia applications, digital television, interactive graphics, and...
Pro Tools 101: Official Courseware
Pro Tools 101: Official Courseware
Digidesign's Official Pro Tools 101 Courseware takes a comprehensive approach to learning the fundamentals of Pro Tools/HD, Pro Tools LE, or Pro Tools M-Powered systems. Now updated for Pro Tools 7 software, this new edition from the definitive authority on Pro Tools covers everything you need to know to complete a Pro Tools project. Learn to build...
Result Page: Previous 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy