Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using Information Technology

Buy
Using Information Technology, 9780071107686 (0071107681), McGraw-Hill, 2006
If there is anything we have learned from our 25 years of writing computer concepts books, it is this: the landscape of computer education can change quickly, and it's our responsibility to try to anticipate it.

The third edition of this text retains its comprehensive coverage, while decreasing the length, adding a separate Internet chapter, refining the hands-on Internet exercises, and implementing a coherent Web strategy.

(HTML tags aren't allowed.)

Microsoft Mapping: Geospatial Development with Bing Maps and C#
Microsoft Mapping: Geospatial Development with Bing Maps and C#

Geospatial mapping applications have become hugely popular in recent years. With smart-phone and tablet numbers snow-balling this trend looks set to continue well into the future. Indeed, it is true to say that in today’s mobile world location-aware apps are becoming the norm rather than the exception. 

In
...

Kali Linux Network Scanning Cookbook - Second Edition
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated...
The Craving Mind: From Cigarettes to Smartphones to Love – Why We Get Hooked and How We Can Break Bad Habits
The Craving Mind: From Cigarettes to Smartphones to Love – Why We Get Hooked and How We Can Break Bad Habits
A leading neuroscientist and pioneer in the study of mindfulness explains why addictions are so tenacious and how we can learn to conquer them

We are all vulnerable to addiction. Whether it’s a compulsion to constantly check social media, binge eating, smoking, excessive drinking, or any other behaviors, we may
...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Storage Networks: The Complete Reference
Storage Networks: The Complete Reference
This comprehensive guide helps you stay on top of storage networking innovations while understanding the realities of storage networks in the data center. Use the essential concepts of storage networks including architecture, devices, connectivity options, and data organization methods to design and apply comprehensive and successful storage...
NHibernate in Action
NHibernate in Action
In the classic style of Manning's "In Action" series, NHibernate in Action shows .NET developers how to use the NHibernate Object/Relational Mapping tool. This book is a translation from Java to .NET, as well as an expansion, of Manning's bestselling Hibernate in Action. All traces of Java have been carefully replaced by their .NET...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy