eBooks-it.org Logo
eBooks-IT.org Inner Image

How To eBooks

Download free How To eBooks

Configuration Guide for Asterisk PBX

How to Build and Configure a Pbx With Open Source Software
Configuration Guide for Asterisk PBX Image
Asterisk is one of the most important open source softwares for IP telephony. Since it was first released in 1999 it has been transforming and innovating the whole telephony market. The Configuration Guide for Asterisk PBX is a text book dedicated for people who wants to learn Asterisk. It has been built more like a text book instead of a reference. You should be able to learn Asterisk in a week with this book. The new version is updated for Asterisk 1.4 and 1.6. There is a new chapter on how to setup Asterisk using freePBX 2.5....

How to Do Everything with HTML & XHTML

How to Do Everything with HTML & XHTML Image
Get straight to the essentials of Web site development with of this step-by-step goldmine. Learn to build your Web site using HTML and XHTML basics. Then, this easy-to-follow guide takes you through adding images, using tables for data and layout, creating framesets, enhancing visuals with style sheets, embedding objects, and even adding interactivity with forms....

Visual C# 2012

How to Program
Visual C# 2012 Image
5th Edition
Appropriate for all basic-to-intermediate level courses in Visual C# 2012 programming. Created by world-renowned programming instructors Paul and Harvey Deitel, Visual C# 2012 How to Program, Fifth Edition introduces all facets of the C# 2012 language hands-on, through hundreds of working programs. This book has been thoroughly updated to reflect the major innovations Microsoft has incorporated in Visual C# 2012; all discussions and sample code have been carefully audited against the newest Visual C# language specification. Students begin by getting comfortable with the C# Express 2012 IDE and basic Visual C# syntax. Next, they build their skills...

24 Deadly Sins of Software Security

Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security Image
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActiveEradicate the Most Notorious Insecure Designs and Coding VulnerabilitiesFully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, ...

How to Cheat in Maya 2014

Tools and Techniques for Character Animation
How to Cheat in Maya 2014 Image
All professional animators know a handful of secrets that give them an edge in a production environment. "How to Cheat in Maya" puts these secrets in your hands! Learn time and energy-saving techniques tested in real Hollywood productions in this book, jam-packed with screenshots and scene files designed to get you up to speed quickly. From menus to modeling, lipsync to lighting, How to Cheat in Maya 2014 covers all of the methods available in the latest version of Maya. Get up to speed quickly and produce stellar resultswiththese insiderworkflows. With new, updated cheats for the latest version of Maya, How to Cheat in Maya 2014is an essential guide for amateur and professional 3D animators alike.Fully updated with gold-mine coverage incl...


2007 - 2017 © eBooks-IT.org