|
|
|
|
A First Look at ASP.NET v 2.0Drawing on extraordinary insider access to Microsoft's ASP.NET development team, three renowned ASP.NET experts cover every key platform enhancement, from Master Page templates for standardizing look and feel to improved security and data- access controls. They go far beyond already published white papers and previews, presenting... | | Fundamentals of Semiconductor Physics and DevicesPeople come to technical books with a vast array of daerent needs and requirements, arising from their differing educational backgrounds, professional orientations and career objectives. This is particularly evident in the field of semiconductors, which stands at the juncture of physics, chemistry, electronic engineering, material science and... | | BlackBerry for Work: Productivity for Professionals
The BlackBerry is cool, and the BlackBerry is fun, but the BlackBerry also means serious business. For those of you who bought your BlackBerry to help get your life organized and free yourself from the ball-and-chain of desktop computing, BlackBerry at Work: Productivity for Professionals is the book to show you how. There are plenty... |
|
|
Photos for Mac and iOS: The Missing Manual
Apple’s new Photos app lets you do a whole lot more than simply store and edit pictures and videos on a Mac or iOS device. With this comprehensive guide, you’ll learn how to import, organize, and share your digital memories, as well as how to improve, print, and use your photos in creative projects. With Lesa... | | Read & Think Spanish, Premium Third Edition
Your first-class ticket to building key Spanish language skills
From the bestselling Read & Think series, this fully-illustrated third edition of Read & Think Spanish brings the Spanish language to life! In addition to introducing, developing, and growing key vocabulary, this book gives you an insider’s look at the... | | How to Cheat at Securing a Wireless NetworkWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
- Denial of service (DoS) and other network layer attacks
- Unauthorized
... |
|
|
|
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 |