 |
|
 8051 Microcontrollers: An Applications Based IntroductionThe 8051 architecture developed by Intel has proved to be the most popular and enduring type of microcontroller, available from many manufacturers and widely used for industrial applications and embedded systems as well as being a versatile and economical option for design prototyping, educational use and other project work.
In this book... |  |  Gaming, Simulations and Society: Research Scope and PerspectiveThis book presents a current research scope and perspective of Simulation and Gaming. Theoretical problems of Simulation and Gaming will be examined with a view to improving the social sciences through the introduction of the techniques and concepts of Simulation and Gaming. The fields of economics, political science, psychology and business... |  |  Windows Vista for Starters: The Missing ManualFast-paced and easy to use, this concise book teaches you the basics of Windows Vista so you can start using this operating system right away. Written by "New York Times" columnist, bestselling author, Emmy-winning CBS News correspondent and Missing Manuals creator David Pogue, the book will help you:
... |
|
 IBM DB2 9 New FeaturesGet up to speed quickly on the new features in IBM DB2 9
In this book, the IBM expert authors provide you with comprehensive technical details and real-world business uses for all of the exciting new features in the current release of DB2 9. You’ll learn about the capabilities found in pureXML as well as administrative enhancements... |  |  CISSP For Dummies (Computer/Tech)Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying... |  |  Java Security SolutionsYour complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,... |
|
 |  |  Transformations and Projections in Computer GraphicsThere is no question that computer graphics has become an important field that pervades our lives in many areas. Many advertisements on television and in magazines are graphical and are created on computers. The screens of computers, PDAs, cellular telephones, and similar devices interact graphically with the user. More and more fulllength feature... |  |  Designing for Networked Communications: Strategies and DevelopmentDesigning for Networked Communications: Strategies and Development is a book about how we plan, use, and understand the products, dynamic social processes, and tasks upon which depend some of the most vital innovations in the knowledge society—social as well as technological ones. Focusing on various forms of design, implementation, and... |
|
 Taxes 2007 For DummiesTax season doesn’t just have to be about paying Uncle Sam his due. Sure, giving up your hard-earned dollars hurts, but you can turn lemons into lemonade by turning knowledge into immediate and long-term tax savings. What’s more, wising up about your tax situation can only increase your financial savvy and bolster your future... |  |  Upgrading and Repairing PCs (14th Edition)This is the newest comprehensive update to the world's #1 guide to PC repair and maintenance. Worldrenowned PC hardware expert Scott Mueller has thoroughly updated his legendary Upgrading and Repairing PCs to reflect today's latest PC technologies, and added a new DVD with more than two hours of digital video demonstrating PC maintenance and... |  |  |
|
Result Page: 1787 1786 1785 1784 1783 1782 1781 1780 1779 1778 1777 1776 1775 1774 1773 1772 1771 1770 1769 |