IT eBooks
Download, Read, Use
Essential XML Quick Reference
Essential XML Quick Reference

Even the most experienced XML developer needs a reference guide with essential information and quick answers to the questions and problems that inevitably arise. Essential XML Quick Reference - is the most comprehensive and authoritative book available. Covering all of XML, as well as many related protocols and technologies, this book provides a handy, one-stop resource to XML syntax, usage, and programming techniques. Compiled and written by two leading XML authorities, the book provides complete coverage of all relevant topics. Each chapter provides a topic overview, explanations of various elements, and several meaningful examples. ...
Security Metrics
Security Metrics

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. ...
The Official Joomla! Book
The Official Joomla! Book

The Official Joomla! Book is the authoritative and comprehensive Joomla! reference for every administrator, developer, designer, and content manager. Distilling the unsurpassed experience of two long-time Joomla! contributors, it teaches exactly what you need to know, through practical example sites and crystal-clear explanations. If you're new to Joomla!, you'll learn how to quickly create usable, effective sites. If you're an experienced Joomla! user, you'll learn how to make your sites more flexible, feature-rich, visually attractive, and useful. And whether new or experienced, you'll learn how Joomla! really works, so you can fully leverage its power whenever you're ready. ...
It's Never Done That Before!
It's Never Done That Before!

When Windows works properly, it's relatively easy to ignore; you can concentrate on the work you're trying to do and forget about the plumbing inside your computer. But when something goes wrong, it often requires an experienced guide to solve the problem and restore the computer to working condition. Everybody who uses Microsoft Windows eventually has to deal with cryptic error messages, frozen screens, and other more or less dramatic problems. Windows troubleshooting is the set of tools and techniques that can identify the source of a problem and find a solution. ...
Hacking VoIP
Hacking VoIP

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. ...
Realm of Racket
Realm of Racket

Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language. In Realm of Racket, you'll learn to program by creating increasingly complex games. Your journey begins with the Guess My Number game and coverage of some basic Racket etiquette. Next you'll dig into syntax and semantics, lists, structures, and conditionals, and learn to work with recursion and the GUI as you build the Robot Snake game. After that it's on to lambda and mutant structs (and an Orc Battle), and fancy loops and the Dice of Doom. Finally, you'll explore laziness, AI, distributed games, and the Hungry Henry game. ...
Game Invaders
Game Invaders

Presenting a holistic and thoroughly practical investigation of the true nature of computer games that arms readers with a small yet powerful set of theories for developing unique approaches to understanding games. Game Invaders fully integrates genre theory, new media aesthetics, perceptual opportunities, and semiotics into a practical DIY toolkit for games analysis—offering detailed guidance for how to conduct in-depth critiques of game content and gameplay. Featuring an informal and witty writing style, the book devotes a number of chapters to specific games from all eras, clearly demonstrating the practical application of the theories to modern, large-scale computer games. ...
Loop-shaping Robust Control
Loop-shaping Robust Control

The loop-shaping approach consists of obtaining a specification in relation to the open loop of the control from specifications regarding various closed loop transfers, because it is easier to work on a single transfer (in addition to the open loop) than on a multitude of transfers (various loopings such as set point/error, disturbance / error, disturbance / control, etc.). The simplicity and flexibility of the approach make it very well adapted to the industrial context. This book presents the loop-shaping approach in its entirety, starting with the declension of high-level specifications into a loop-shaping specification. It then shows how it is possible to fully integrate this approach for the calculation of robust and efficient correctors with the help of existing techniques, which have already been industrially tried and tested, such as H-infinity synthesis. ...
Teach Yourself Visually PowerPoint 2013
Teach Yourself Visually PowerPoint 2013

PowerPoint 2013 boasts updated features and new possibilities; this highly visual tutorial provides step-by-step instructions to help you learn all the capabilities of PowerPoint 2013. It covers the basics, as well as all the exciting new changes and additions in a series of easy-to-follow, full-color, two-page tutorials. Learn how to create slides, dress them up using templates and graphics, add sound and animation, and more. This book is the ideal "show me, don't tell me" guide to PowerPoint 2013. ...
Windows 8 Tweaks
Windows 8 Tweaks

From a Microsoft MVP, who is also the savvy creator of Tweaks.com, comes this ultimate collection of Windows 8 workarounds. Steve Sinchak takes you way beyond default system settings, deep under the hood of Windows 8, down to the hidden gems that let you customize your Windows 8 system like you wouldn't believe. From helping you customize the appearance to setting up home networking, sharing media, and squeezing every ounce of performance out of the OS, this book delivers. Get ready to rock and roll with Windows 8! ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025