 |
|
|
|
 |  |  AD HOC NETWORKS: Technologies and ProtocolsWireless mobile networks and devices are becoming increasingly popular as they provide users access to information and communication anytime and anywhere. Conventional wireless mobile communications are usually supported by a wired fixed infrastructure. A mobile device would use a single-hop wireless radio communication to... |  |  |
|
|
|
 CD Cracking Uncovered: Protection Against Unsanctioned CD CopyingA manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver... |  |  The Red Gate Guide to SQL Server Team-based Development
Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.
In some cases, this will mean some developers and one or two DBAs,... |  |  Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Change: It’s what we expect from technology, from the PC to
the web, through to HD TV. But nothing has been as disruptive
as the change the iPhone and Android phones have brought.
For the first time the power of a computer will fit in your hand,
you are always connected to the Internet, and these devices are
loaded with... |
|
|
Result Page: 193 192 191 190 189 188 187 186 185 184 |