Home | Amazing | Today | Tags | Publishers | Years | Search 
Quantum Computing Explained
Quantum Computing Explained
“In the twenty-first” century it is reasonable to expect that some of the most important developments in science and engineering will come about through interdisciplinary research. Already in the making is surely one of the most interesting and exciting development we are sure to see for a long time, quantum computation.

A
...
Create!: The No Nonsense Guide to Photoshop Elements 2
Create!: The No Nonsense Guide to Photoshop Elements 2
Because Your Computer Should Improve Your Life, Not Complicate It

No Nonsense Guides are here. With a plainspoken approach, these books are inexpensive starters that are light on idle chat and heavy on practical advice. They're lean and mean and stripped down to fighting weight, so you'll get from point A to point Z with instruction...

Silverlight 1.0
Silverlight 1.0
Silverlight—the hot new web technology based on the powerful WPF graphics platform that ships with Windows Vista—is the web developer's choice for creating cross-platform interactive applications that work in multiple browsers. This one-of-a-kindreference shows you, with full-color illustrations, how to create rich interactive apps with...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)
Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)
Experiment with cryptography — the science of secret writing. Cipher and decipher codes: transposition and polyalphabetical ciphers, famous codes, typewriter and telephone codes, codes that use playing cards, knots, and swizzle sticks...even invisible writing and sending messages through outer space. Hours of intrigue and challenge. 45...
WAP, Bluetooth, and 3G Programming: Cracking the Code (With CD-ROM)
WAP, Bluetooth, and 3G Programming: Cracking the Code (With CD-ROM)
Cracking the Code WAP, Bluetooth, and 3G Programming Create Tomorrow's Mobile Applications Today In this unique guide, a crack team of software engineers delivers the programming solutions and source code you need to jump start a wide range of mobile advertising, commerce, and audio-video streaming projects. Using flow charts and line-by-line...
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

  
   
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy