 |
|
 Understanding Telephone Electronics, Fourth Edition (Newnes)Covers conventional telephone fundamentals! Explores how telephone systems operate and how digital electronics replace them. "Introduces state-of-the-art speech circuits, dialing, ringing, and central office electronics. Dissects modems and digital transmission techniques. Studies microcomputers and cellular phones. Helps readers increase... |  |  Building a WordPress Blog People Want to ReadHaving your own blog isn't just for the nerdy anymore. Today, it seems everyone—from multinational corporations to a neighbor up the street—has a blog. They all have one, in part, because the folks at WordPress make it easy to get one. but to actually build a good blog—to create a blog people want to... |  |  Beginning PHP 6, Apache, MySQL 6 Web DevelopmentOffering a step-by-step walk through understanding the three key open source technologies that form the basis for most active web servers, this book demonstrates how to quickly create a professional-looking, functional site using Apache Web server, the MySQL database system, and the PHP scripting language. You’ll take an in-depth look at why... |
|
 |  |  Adobe Photoshop ForensicsThanks to TV's crime scene investigation shows, forensic technology has entered popular culture. Combining puzzle solving and a dramatic storyline, these shows fascinate audiences as high-tech procedures uncover the truths hidden in seemingly insignificant clues. What many people may not realize is that forensic teams also use items they probably... |  |  Chances Are: Adventures in ProbabilityA layman’s journey into the realm of probability—from poker to politics, weather to war, Monte Carlo to mortality
We search for certainty, but find only likelihood. All things are possible, only one thing actually happens; everything else is in the realm of probability. The twin disciplines of... |
|
|
 Identity Theft Handbook: Detection, Prevention, and SecurityThe magnitude of the identity theft and fraud problem is enormous. Identity fraud was identified as one of the top priorities of the Department of Justice, just prior to the terrorist attacks of 9/11. Naturally, everyone’s priorities changed after 9/11. The impact of identity theft and identity fraud is reaching a proportion and a level of... |  |  Seeing the Elephant: Understanding Globalization from Trunk to TailIn the new millennium, it is nearly impossible for us to talk about basic concerns like food or gas prices, without examining global intersections in trade, energy, immigration, the environment, and defense. Many countries once described as "developing" nations now wield greater economic and political influence than some of the... |  |  |
|
| Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |