AD HOC NETWORKS: Technologies and Protocols Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...
The Red Gate Guide to SQL Server Team-based Development
Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.
In some cases, this will mean some developers and one or two DBAs,...
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Change: It’s what we expect from technology, from the PC to
the web, through to HD TV. But nothing has been as disruptive
as the change the iPhone and Android phones have brought.
For the first time the power of a computer will fit in your hand,
you are always connected to the Internet, and these devices are
|Result Page: 193 192 191 190 189 188 187 186 185 184 |