|
|
|
|
The Handbook of Nanotechnology: Business, Policy, and Intellectual Property Law"This Handbook is sure to become the ultimate sourcebook for everyone involved in the emerging field of nanotechnology. I would strongly recommend that any entrepreneur who wishes to begin a nanotechnology company and any investor who wishes to seek funding opportunities in nanotechnology read this work cover to cover. By providing the tools... | | Electronic Commerce: Fundamentals & ApplicationsA comprehensive introduction to the underlying technologies of e-commerce. This book explores the full range of technologies, protocols, and techniques necessary for building successful e-commerce sites. The authors begin with an overview of the Internet and the Web, then quickly move on to explain server-side programming techniques, cryptography... | | Pro Tools LE 7 Ignite! (Pro Tools Le 7 Ignite!: The Visual Guide for New Users)Get ready to explore the world of computer music creation with Pro Tools® LE 7! Even if you’ve never created music on your computer, Pro Tools LE 7 Ignite!, Second Edition will give you the skills you need to record and mix with confidence. Completely updated to cover the new features of Pro Tools LE 7.3 and 7.4, the book presents... |
|
|
Object Oriented Programming in VB.NetThis book takes an object-oriented approach to introduce Visual Basic .NET. The author begins by covering object-oriented analysis, design, and modeling using UML. He then moves into a detailed discussion of objects and clasess, after which, readers begin develoing their own short programs. Advanced topics such as data structures, components,... | | Software Development HandbookThis Second Edition of the Software Development Handbook has been extensively revised and updated to incorporate new developments, and to improve and clarify the presentation.
This handbook is not intended as a complete course in software development for microcomputers. However, witb appropriate additional material and combined with... | | Testing Code Security
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and... |
|
|
|
Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 |