"Dives headfirst into getting the most out of Google: finding rather than just searching, performing useful tasks to get a job done and using the Google API to automate complicated or repetitive tasks." - cover.
Google Hacks |
Google Hacks"Dives headfirst into getting the most out of Google: finding rather than just searching, performing useful tasks to get a job done and using the Google API to automate complicated or repetitive tasks." - cover. |
Hacking: The Art of Exploitation, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical ... |
Wireless HacksContinuing with the successful Hack Series, this title provides real-world working examples of how to make useful things happen with wireless equipment. |
QEMU: virtuelle Computer für viele Betriebssysteme ; QEMU Version 0.9.1Dieses Fachbuch beschreibt die Software QEMU. Das kostenlose, quelloffene QEMU emuliert die komplette Hardware eines Computers mit CPU. Damit ist es mglich, Software verschiedener Prozessorarchitekturen auszufhren. QEMU ist nicht, wie zum ... |
Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning LinuxUbuntu Linux--the most popular Linux distribution on the planet--preserves the spirit embodied in the ancient African word ubuntu, which means both "humanity to others" and "I am what I am because of who we all are." Ubuntu won the Linux Journal ... |
Beginning Ubuntu LTS Server Administration: From Novice to ProfessionalProvides information on Ubuntu Server administration, working with Linux commands, using Web services, setting up a file system, and virtualization. |
Using Joomla: Building Powerful and Efficient Web SitesWhy use Joomla? Because with Joomla you don't need to have any technical expertise or web design experience to create effective websites and web apps. Whether you're creating your first website or building a multi-function site for a client, this ... |
Beginning UnixCovering all aspects of the Unix operating system and assuming no prior knowledge of Unix, this book begins with the fundamentals and works from the ground up to some of the more advanced programming techniques The authors provide a wealth of ... |
SSH, The Secure Shell: The Definitive GuideAre you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and ... |