Home | Amazing | Today | Tags | Publishers | Years | Search 
The Black Art of Xbox Mods
The Black Art of Xbox Mods
The Xbox might be described as a powerful, proprietary PC that has been customized exclusively for running games. This book will help you to maximize the potential of your Xbox video game console by showing you how to modify your Xbox in various ways. You will learn how to disassemble your Xbox, right down to the motherboard, and you will...
Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Multimedia on Symbian OS: Inside the Convergence Device (Symbian Press)
Multimedia on Symbian OS: Inside the Convergence Device (Symbian Press)
Multimedia on Symbian OS is the only book available to discuss multimedia on Symbian OS at this level. It covers key areas of multimedia technology, with information about APIs and services provided by Symbian OS. Other key features include details of UI platform-specific APIs from S60 and UIQ.

This pioneering book covers each of...

Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
This practical book is for anyone who needs to understand the solutions that allow multimedia communications between mobile networks and fixed wireless communications. It presents the fundamentals of individual fixed and mobile wireless technologies in terms of architectures, standards, management capabilities and quality of service issues, is...
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
Mastering Microsoft SQL Server 2005
Mastering Microsoft SQL Server 2005

The Comprehensive Resource for SQL Server 2005 Administrators, Consultants, and Developers

Whether you're a systems administrator, database application developer, or IT consultant, you'll quickly ratchet up your knowledge of Microsoft SQL Server 2005 with this thorough and comprehensive guide. Light...

Projects in Computing and Information Systems: A Student's Guide
Projects in Computing and Information Systems: A Student's Guide
Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and...
Java 2 Web Developer Certification Study Guide, 2nd Edition
Java 2 Web Developer Certification Study Guide, 2nd Edition

Here’s the book you need to prepare for Exam 310-080, Sun Certified Web Component Developer for J2EE Platform.

This Study Guide provides:

  • In-depth coverage of every exam objective
  • Practical information on programming servlets, developing JSP pages,...
High Performance Embedded Computing Handbook: A Systems Perspective
High Performance Embedded Computing Handbook: A Systems Perspective
Embedded systems technology involves a range of topics, including analog-to-digital conversion and application-specific integrated circuit design. From the history of high-performance computing to a discussion of future directions, High Performance Embedded Computing Handbook offers comprehensive coverage of all aspects of these...
Principles of Embedded Networked Systems Design
Principles of Embedded Networked Systems Design
"...this volume represents a real mine of information...anyone working in the field would benefit from owning a copy." IEEE Communications Engineer

Embedded network systems (ENS) provide a set of technologies that can link the physical world to large-scale networks in applications, such as monitoring of borders,
...
Essential COM (DevelopMentor Series)
Essential COM (DevelopMentor Series)
The Component Object Model (COM) is deep and extremely difficult, making it impossible to grasp the ideas behind this specification quickly or easily. Don Box, the author of Essential COM concedes that it took him six months of reading documentation, writing programs, and experiencing general puzzlement before he had his personal COM...
The Rubato Composer Music Software: Component-Based Implementation of a Functorial Concept Architecture (Computational Music Science)
The Rubato Composer Music Software: Component-Based Implementation of a Functorial Concept Architecture (Computational Music Science)
Both modern mathematical music theory and computer science are strongly influenced by the theory of categories and functors. One outcome of this research is the data format of denotators, which is based on set-valued presheaves over the category of modules and diaffine homomorphisms. The functorial approach of denotators deals with generalized...
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy