Computers

Best Selling / Page 314

icon Subscribe to feed

Browse

Best Selling

New Releases

Awards

 

Category

Delete Computers

 

In category

Programming (2369)

Personal Computing (1556)

Web (1336)

Database (808)

Graphism (708)

Enterprise software and computing (627)

Hardware and devices (435)

System Administration (417)

Audio, Vidéo (398)

Computer Architecture (68)

Network and Telecommunications (66)

Theory (2)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (9461)

French (454)

German (66)

Spanish (109)

Italian (564)

 

Protection

All (9461)

DRM Free (1464)

DRM (7997)

More options

Managing Security with Snort & IDS Tools

by Kerry J. Cox & Christopher Gerg

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from...


DVD Studio Pro 3: In the Studio: In the Studio

by Marc Loy

Apple's DVD Studio Pro, released in 2001, provided a low-cost, professional solution for home and small business DVD authoring. Today, the highly sophisticated yet easy-to-use DVD Studio Pro 3 allows independent...


TiVo Hacks: 100 Industrial-Strength Tips & Tools

by Raffi Krikorian

TiVo Hacks helps you get the most out of your TiVo personal video recorder. Armed with just a screwdriver and basic understanding of PC hardware (or willingness to learn), preeminent hackability awaits. This...


Ebay: The Missing Manual: The Missing Manual

by Nancy Conner

It's the undisputed king of Internet auction sites. It's a global bazaar offering a range of goods from Antiques to Zulu Daisies. Cars, clothing, collectibles: you name it, and it's likely that you can find...


Security Warrior

by Cyrus Peikari & Anton Chuvakin

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the...


Java Servlet & JSP Cookbook

by Bruce W. Perry

With literally hundreds of examples and thousands of lines of code, the Java Servlet and JSP Cookbook yields tips and techniques that any Java web developer who uses JavaServer Pages or servlets will use every...


Learning GNU Emacs

by Debra Cameron, James Elliott & Marc Loy

GNU Emacs is the most popular and widespread of the Emacs family of editors. It is also the most powerful and flexible. Unlike all other text editors, GNU Emacs is a complete working environment--you can stay...


SQL Tuning

by Dan Tow

A poorly performing database application not only costs users time, but also has an impact on other applications running on the same computer or the same network. SQL Tuning provides an essential next step for...


Oracle Essentials: Oracle Database 10g

by Rick Greenwald, Robert Stackowiak & Jonathan Stern

An enormous system comprising myriad technologies, options, and releases, Oracle's complexities have spawned numerous areas of specialization. For each area of specialization there are equally specialized how-to...


VBScript in a Nutshell

by Paul Lomax, Matt Childs & Ron Petrusha

Lightweight yet powerful, VBScript from Microsoft® is used in four main areas: server-side web applications using Active Server Pages (ASP), client-side web scripts using Internet Explorer, code behind Outlook...


Java Examples in a Nutshell

by David Flanagan

The author of the best-selling Java in a Nutshell has created an entire book of real-world Java programming examples that you can learn from. If you learn best "by example," this is the book for you.This third...


Windows XP Power Hound: Teach Yourself New Tricks

by Preston Gralla

Windows XP can be a great tool, but it is all too easy to trip over Windows XP's annoying traits more often than you leverage its productivity. Windows XP power-users troll online resources, documentation, and...


Java and XML

by Brett McLaughlin & Justin Edelson

Java and XML, 3rd Edition, shows you how to cut through all the hype about XML and put it to work. It teaches you how to use the APIs, tools, and tricks of XML to build real-world applications. The result is...


Programming .NET Security

by Adam Freeman & Allen Jones

With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address,...


Macintosh Troubleshooting Pocket Guide for Mac OS

by David Lerner, Aaron Freimark & Tekserve Corporation

The press has called Tekserve Corporation, the idiosyncratic Macintosh repair store in New York City, "The Epicenter of Mac Culture in NYC", "The leader in Apple triage services" and "warm and eclectic - maybe...


WebLogic: The Definitive Guide

by Jon Mountjoy & Avinash Chugh

BEA's WebLogic Server implements the full range of J2EE technologies, and includes many additional features such as advanced management, clustering, and web services. Widely adopted, it forms the core of the...


C# Language Pocket Reference

by Peter Drayton, Ben Albahari & Ted Neward

C# programmers all have one thing in common -- they're learning a new language. That fact alone brings challenges, frustrations, and constant demands on your patience. And, no matter how good your reference...


VB.NET Language Pocket Reference

by , PhD Steven Roman, Ron Petrusha & Paul Lomax

Visual Basic .NET is a radically new version of Microsoft Visual Basic, the world's most widely used rapid application development (RAD) package. Whether you are just beginning application development with Visual...


Objective-C Pocket Reference

by Andrew M. Duncan

Objective-C is an exciting and dynamic approach to C-based object-oriented programming; it's the approach adopted by Apple as the foundation for programming under Mac OS X, a Unix-based operating system gaining...


Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More

by John Viega & Matt Messier

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested,...