|
|
Handbook of Wireless Networks and Mobile Computing
The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For... | | Getting Started with iPhone SDK, Android and others
This book covers the known relative differences between the most popular mobile platform development options for handheld devices such as personal digital assistants, enterprise digital assistants or mobile phones.
It helps guide developers in choosing a mobile platform for development on Information appliances, and covers iPhone... | | VirtualBox 3.1: Beginner's Guide
The furore around virtualization is taking the technology world by storm and is a must for efficient utilization of network server capacity, storage administration, energy, and capital. VirtualBox is free which brings down your upfront costs for an agile data center. VirtualBox will transform your IT infrastructure into a lean data center on... |
|
|
Smart Things: Ubiquitous Computing User Experience Design
The world of smart shoes, appliances, and phones is already here, but the practice of user experience (UX) design for ubiquitous computing is still relatively new. Design companies like IDEO and frogdesign are regularly asked to design products that unify software interaction, device design and service design -- which are all the key... | | Data Warehousing Fundamentals for IT Professionals
Cutting-edge content and guidance from a data warehousing expert—now expanded to reflect field trends
Data warehousing has revolutionized the way businesses in a wide variety of industries perform analysis and make strategic decisions. Since the first edition of Data Warehousing Fundamentals, numerous... | | BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer ... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 |