 |
|
 RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive... |  |  Computer Architecture: Software Aspects, Coding, and HardwareAfter having published my first book, Computer Networks: Architecture, Protocols, and Software, friends asked me how long it took to write the book. My reply was that on the surface it took about three years from beginning to end; below the surface it took more like thirty years. Yet, my job is not done unless I write a book on computer... |  |  Creating Mashups with Adobe Flex and AIR (Friends of Ed Abobe Learning Library)It is fair to say that one of the fastest-moving areas in technology, in terms of innovation and “coolness,” is the Web. In the space of ten years, it has gone from being a near text-only medium to a platform upon which developers can create immersive and highly interactive experiences. The impacts on business, entertainment, and... |
|
 |  |  Building Better Boards: A Blueprint for Effective GovernancePraise for Building Better Boards
"Building Better Boards bridges the gap between talk and action. A must-read for board members, CEOs, governance experts – really for anyone who cares about the future of the corporation." –Anne M. Mulcahy, chairman and CEO, Xerox... |  |  Professional Ruby on Rails (Programmer to Programmer)
Professional Ruby on Rails
Nothing less than a revolution in the way web applications are constructed,Ruby on Rails (RoR) boasts a straightforward and intuitive nature that avoids programming repetition and makes it infinitely easier to build for the web. Over the years, RoR has undergone numerous internal changes... |
|
 CompTIA Security+ Deluxe Study GuideCompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquired knowledge with cutting-edge exam preparation software, including a test... |  |  |  |  Open-Source ESBs in ActionMost modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code.... |
|
 How to Cheat in 3ds Max 2009: Get Spectacular Results FastNeed to get results with 3ds max fast? Why take months to learn every button in 3ds max when you can create great visuals with just a few key tools? Learn to create quick yet stunning logo treatments, special effects, and animated characters with the fastest techniques possible. Need convincing grass, trees, water, shadows? You can use the... |  |  Cody's Data Cleaning Techniques Using SAS, Second EditionAlthough this book is titled Cody’s Data Cleaning Techniques Using SAS, I hope that it is more than that. It is my hope that not only will you discover ways to detect data errors, but you will also be exposed to some DATA step programming techniques and SAS procedures that might be new to you.
I have been teaching a two-day data... |  |  Email Marketing: An Hour a DayThis book is your guide to understanding the full marketing potential and impact that email can offer to you or your company. It strives to broaden your mind about the opportunities this amazing communication channel offers, and it provides ways to redefi ne the strategic uses of email as an effective marketing vehicle. And it also, we hope,... |
|
| Result Page: 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 |