|
|
|
|
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone ServiceIf you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and... | | Immunopharmacology of Platelets (Handbook of Immunopharmacology)
Although anucleated, blood platelets are extraordinarily
efficient cells and still the subject of fruitful investigations
in haematology, in vascular physiology, in biochemistry,
and more recently in immunology and in physiopathology
where their metabolism has been implicated
as a source of potential effector compounds. It... | | An Inconvenient Death: How the Establishment Covered Up the David Kelly Affair
The death of Dr David Kelly in 2003 is one of the the strangest events in the 21st century. This scrupulous scientist, an expert on weapons of mass destruction, was caught up in the rush to war in Iraq and in the pressure of those around Tony Blair to provide evidence that Saddam Hussein was producing chemical weapons. Kelly seemed... |
|
XML Schema EssentialsThe definitive how-to guide that will get you quickly up to speed on the practical application of XML Schema! Replacing XML DTDs (Document Type Definitions) as the way in which XML documents are described and validated, XML Schema allows you to describe the structure of information in an XML document and is essential for ensuring... | | | | |
|
Modern Operating SystemsFor software development professionals and computer science students, Modern Operating Systems gives a solid conceptual overview of operating system design, including detailed case studies of Unix/Linux and Windows 2000.
What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand... | | Designing Usable Electronic Text (Second Edition)Designing Usable Electronic Text is without question an important resource to all professionals involved in the field of human-computer interaction and user interface designs.
- HCI International News, April 2005
[A]n engaging presentation of elements... | | Hacking Exposed Cisco NetworksImplement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised... |
|
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 |