Whether you want to become a power searcher, news monger, super shopper, or innovative web developer, Yahoo! Hacks provides the tools to take you further than you ever thought possible.
Tuesday, July 1, 2008
Google Hacks Third Edition
Now that new features and services such as Google Maps, Google Talk, and Google Desktop have been added to the expanding Google universe, we've made the third edition of this bestseller into an infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones.
Labels:
Google Hacks Third Edition
PDF Hacks Book Download
PDF Hacks is ideal for anyone who works with PDFs on a regular basis. Learn how to create PDF documents that are far more powerful than simple representations of paper pages. Hacks cover the full range of PDF functionality, including generating, manipulating, annotating, and consuming PDF information. Far more than another guide to Adobe Acrobat, the book covers a variety of readily available tools for generating, deploying, and editing PDF.
Labels:
PDF Hacks Book
PSP Hacks Book Download
PSP Hacks shows you how to make the versatile and powerful new PlayStation Portable (PSP) do more than you ever imagined--and more than Sony ever intended--with 50 innovative hacks, tweaks, tricks, and how-tos for customizing your PSP and taking full advantage of features, capabilities, and functionality far beyond what's listed in the PSP user manual.
Labels:
PSP Hacks
Phising Exposed Free Download
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with technically detailed forensic examinations of real phishing scams. Armed with this invaluable intelligence, law enforcement officers, system administrators, and fraud investigators can resolve existing cases and prevent future attacks.
Labels:
Phising Expose book
Subscribe to:
Posts (Atom)