eBooks-it.org Logo
eBooks-IT.org Inner Image

Business & Culture eBooks Page 9

Download free Business & Culture eBooks Page 9

Don't Get Burned on EBay

How to Avoid Scams and Escape Bad Deals
Don't Get Burned on EBay Image
Lots of books tell you how to buy and sell on eBay. But what if something goes horribly awry? Do you have to chalk it up to a "lesson learned," lick your wounds and move on? Not a chance. Don't Get Burned on eBay offers relevant lessons based on real-life stories posted on eBay's Answer Center. With sharp, witty rhetoric, veteran eBay user Shauna Wright (co-founder of the popular web site WhoWouldBuyThat.com), shows eBay veterans and newcomers alike how to avoid those nasty scenarios, and how to pull themselves out of the muck if they've already fallen in. Six entertaining (and hair-raising) chapters cover real problems that people have encountered with bidding, payment, shipping, packaging, dealing with other eBayers, and coping with the e...

Apache Security

Apache Security Image
Note: This book is now out of print. A Kindle version published by the author is available from Amazon. For other digital formats (PDF, EPUB, etc), please visit feistyduck.com.With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one.To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it--whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site.Our new guide, Apache Security, give...

802.11 Security

802.11 Security Image
Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network.802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") sp...

Service Strategy Book

Service Strategy Book Image
A view of ITIL that aligns business and IT so that each brings out the best in the other. It ensures that every element of the Service Lifecycle is focused on customer outcomes and relates to all the companion process elements that follow. Subsequent titles in the core set will link deliverables to meeting the business goals, requirements and service management principles described in this publication. Each of the five core titles shares a consistent structure; the various practice elements are easily navigated and extensively cross-referenced....

The Allure of Machinic Life

Cybernetics, Artificial Life, and the New AI
The Allure of Machinic Life Image
In The Allure of Machinic Life, John Johnston examines new forms of nascent life that emerge through technical interactions within human-constructed environments--"machinic life"--in the sciences of cybernetics, artificial life, and artificial intelligence. With the development of such research initiatives as the evolution of digital organisms, computer immune systems, artificial protocells, evolutionary robotics, and swarm systems, Johnston argues, machinic life has achieved a complexity and autonomy worthy of study in its own right. Drawing on the publications of scientists as well as a range of work in contemporary philosophy and cultural theory, but always with the primary focus on the "objects at hand"--the machines, programs...



2007 - 2017 © eBooks-IT.org