Информационные технологии стр. 272

Популярное
John Walkenbach

This book is a single reference that’s indispensable for Excel beginners, intermediate users, power users, and would-be power users everywhere Fully updated for the new release, this latest edition...

Подробнее
John Walkenbach

This book is a single reference that’s indispensable for Excel beginners, intermediate users, power users, and would-be power users everywhere Fully updated for the new release, this latest edition...

Подробнее
Dan Woods

Corporations have finally realized the value of collaboration tools for knowledge sharing and Wiki is the open source technology for creating collaborative Web sites, as either a public site on the...

Подробнее
Doug Sahlin

YouTube For Dummies takes the classic Dummies tact in helping tech novices get a handle on a popular technology that more tech-savvy audiences consider «simple.» With so much content on YouTube...

Подробнее
Howie Jacobson

AdWords lets every business-from eBay PowerSellers to Fortune 500 companies-create targeted, cost-efficient advertising campaigns on the Web, and accounts for the bulk of Google's $6 billion in...

Подробнее
Diane Koers

Not feeling too peachy about computerizing your accounting system? Relax! Peachtree For Dummies, 3rd Edition will show you how to set up your company in Peachtree and then use it to pay bills,...

Подробнее
Neil Matthew

Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform. Through the use of detailed and realistic...

Подробнее
Bernard Golden

Virtualization has become a “megatrend”—and for good reason. Implementing virtualization allows for more efficient utilization of network server capacity, simpler storage administration, reduced...

Подробнее
Laurie Fuller Ulrich

Get the book you need to succeed in any Photoshop endeavor – Photoshop CS3 Bible. In this totally updated edition to the international bestseller, the authors show you how to master every aspect of...

Подробнее
Karen Fredricks S.

SugarCRM is an innovative customer relationship management software solution that enhances your company’s marketing effectiveness, drives sales performance, improves customer satisfaction, and...

Подробнее
Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths...

Подробнее
Steve Holzner

A great way to get started on this new, FREE, Web-based productivity and collaboration tool Zoho is a very cool-and free-alternative to Microsoft Office. Known as «cloud» computing because it's...

Подробнее
Eric Cole

The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest...

Подробнее
Jim Boyce

This comprehensive reference by a Microsoft expert covers all aspects of the new Windows release The much-anticipated release of Windows 7 will have numerous changes, and you'll need a complete guide...

Подробнее
Stephen McDaniel

The fun and easy way to learn to use this leading business intelligence tool Written by an author team who is directly involved with SAS, this easy-to-follow guide is fully updated for the latest...

Подробнее
Ramón Hontañón J.

Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a...

Подробнее
Kanglin Li

Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective...

Подробнее
Steve Pate D.

Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical data Offers more detail than other books on the...

Подробнее
Adam Young

Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the...

Подробнее
John Chirillo

Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the...

Подробнее