Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Telecommunications Protocols for Data Networks
Mobile Telecommunications Protocols for Data Networks
Technology has changed our lives and the way we see the world. The growing use of mobile technologies in phones, computers and everyday applications has fuelled the demand for efficient connectivity, irrespective of the location of the device. This connectivity has to be provided by various different networks and protocols that guarantee the smooth...
Apple I Replica Creation: Back to the Garage
Apple I Replica Creation: Back to the Garage
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design. The book will begin by teaching readers the basics of computer processing by...
Faster Smarter A+ Certification
Faster Smarter A+ Certification

Take the next step in your career by earning your CompTIA A+ certification the faster, smarter way. This innovative, high-energy guide makes the most of your study time by teaching exactly what you need for the A+ Core Hardware and Operating Systems Technologies exams. You get focused, no-fluff coverage of exam objectives—plus Test Smart...

3D Game Programming for Teens
3D Game Programming for Teens
"3D Game Programming for Teens" is a comprehensive, step-by-step introduction to 3D game programming for both teenagers and non-programmers. Organized into three parts, the book begins with an introduction to the game development industry, the game development process, and game engines including WildTangent. Part two covers JavaScript and...
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

The Design and Analysis of Parallel Algorithms
The Design and Analysis of Parallel Algorithms

This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...

Java How to Program (early objects) (9th Edition) (Deitel)
Java How to Program (early objects) (9th Edition) (Deitel)

Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.

The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of...

Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

Excel 2016 for Marketing Statistics: A Guide to Solving Practical Problems (Excel for Statistics)
Excel 2016 for Marketing Statistics: A Guide to Solving Practical Problems (Excel for Statistics)

This is the first book to show the capabilities of Microsoft Excel in teaching marketing statistics effectively. It is a step-by-step exercise-driven guide for students and practitioners who need to master Excel to solve practical marketing problems. If understanding statistics isn’t your strongest suit, you are not especially...

Wi-Fi Home Networking
Wi-Fi Home Networking

For many professionals, wireless home computer networking delivers the power of corporate technology — without the hassles of corporate living, and the mobile connectivity to all of the computers throughout your home (or backyard) — without rewiring.

That’s why if you plan to set up a wireless...

Absolute Beginner's Guide to Networking, Fourth Edition
Absolute Beginner's Guide to Networking, Fourth Edition

Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the...

Programming Erlang: Software for a Concurrent World
Programming Erlang: Software for a Concurrent World
Erlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.

Moore's Law is the observation that the amount you can do on a single chip...

unlimited object storage image
Result Page: 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy