Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Microsoft Office Project 2007 All-in-One Desk Reference For Dummies
Microsoft Office Project 2007 All-in-One Desk Reference For Dummies

10 books in 1— your key to success with Microsoft Project!

Your one-stop guide to managing your business with the world's #1 project management software

Want to save time and money with Microsoft Project? This friendly guide arms you with an arsenal of tools to get productive...

SQL: The Complete Reference, Second Edition
SQL: The Complete Reference, Second Edition
The Most Comprehensive SQL Resource Available

Get in-depth details on all the powerful features and capabilities of SQL inside this one-stop guide. Featuring broad coverage of every aspect of this leading database language, this book provides you with an overview of SQL then shows you how to retrieve and update data, program with SQL, use...

ActionScript Developer's Guide to PureMVC
ActionScript Developer's Guide to PureMVC

Too often in the development of a large application, the developer must stop and think about where to find some class he needs, where some new class should go, and how to wire them up in such a way that gets data from wherever it lives to a display so the user can interact with it or vice-versa.

Novel Therapeutic Targets for Antiarrhythmic Drugs
Novel Therapeutic Targets for Antiarrhythmic Drugs

Profiles potential treatment approaches for cardiac arrhythmias

Cardiac arrhythmias of ventricular origin are responsible for the deaths of nearly half a million Americans each year while atrial fibrillation accounts for about 2.3 million cases per year, a rate that is projected to increase 2.5 fold over the next half...

Advanced Java® EE Development with WildFly®
Advanced Java® EE Development with WildFly®

Your one-stop guide to developing Java® EE applications with the Eclipse IDE, Maven, and WildFly® 8.1

About This Book

  • Develop Java EE 7 applications using the WildFly platform
  • Discover how to use EJB 3.x, JSF 2.x, Ajax, JAX-RS, JAX-WS, and Spring with WildFly 8.1
  • A...
Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
"One stop shopping for J2EE."
– Scott Ambler, Senior Consultant, Ronin International, Inc. and Author of Agile Modeling

If Java 2 Enterprise Edition 1.4 can do it, you can do it too...

You already know that Java 2 Enterprise Edition 1.4 makes your enterprise services more cost-effective, more adaptable,...

Thinking Animation: Bridging the Gap Between 2D and CG
Thinking Animation: Bridging the Gap Between 2D and CG
Learn how to think before you animate. Thinking Animation is a one-of-a-kind book that emphasizes how artists can use traditional animation techniques and principles with the computer generated animation technology of today. Written by seasoned animators with experience in both 2D and CG, Thinking Animation is an exquisite guide aimed at...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
The Web Programmer's Desk Reference
The Web Programmer's Desk Reference

One of the challenges of web programming is remembering what you can do with what, and what works with everything else. Sure, you can create a button, but can you change its color and font to match the style of your site? And are you sure it will look the same on all browsers? With The Web Programmer's Desk Reference, you can find...

Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

unlimited object storage image
Result Page: 68 67 66 65 64 63 62 61 60 59 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy