|
|
|
|
|
|
Hardware Hacking Projects for Geeks
Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for... | | Microsoft Dynamics NAV 2009 Application Design
Dynamics NAV 2009 is an Enterprise Resource Planning (ERP) software product from Microsoft that can be used for variety of business needs. It is part of the Microsoft Dynamics family, and intended to assist with finance, manufacturing, Customer Relationship Management, supply chains, analytics, and electronic commerce for small and... | | MacAddict Guide to Living the iLife
Macs today come "fully loaded," but unlike your typical fully loaded automobile, Macs do not come with detailed instruction manuals. Instead, the user is often left to fend for him or herself as they try to sort through all that powerful and mysterious software. On the surface, these programs are relatively easy-to-use, but it is... |
|
Buying & Selling Sports Collectibles on eBayIf you’re a sports fan, you’ve probably bought some kind of sports memorabilia sometime in your life. Folks can buy all kinds of stuff at the ballpark or at the stadium, ranging from jerseys to hats to balls and photos. There are keychains, trading cards, blankets, bobble head dolls, and even cookbooks designed for fans who love their... | | | | Embedded Java Security: Security for Mobile DevicesThis book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically... |
|
|
Result Page: 6 5 4 3 2 1 |