Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth® wireless technology is a short-range radio standard that provides new opportunities for wireless devices. This radio standard was designed originally as a way of eliminating the cables currently attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized...
Introduction to Power Electronics (Essential Electronics Series)
Introduction to Power Electronics (Essential Electronics Series)
Building on solid state device and electromagnetic contributions to the series, this text book introduces modern power electronics, that is the application of semiconductor devices to the control and conversion of electrical power. The increased availability of solid state power switches has created a very rapid expansion in applications, from the...
C# 2010 All-in-One For Dummies
C# 2010 All-in-One For Dummies

A logical, straightforward approach to learning the C# language

C# is a complicated programming language for building .NET-connected software for Microsoft Windows, the Web, and a wide range of devices. The friendly All-in-One For Dummies format is a perfect way to present it. Each minibook is a self-contained package...

Getting Started with Citrix XenApp 6
Getting Started with Citrix XenApp 6

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure...

Sams Teach Yourself iPad 2 in 10 Minutes (2nd Edition)
Sams Teach Yourself iPad 2 in 10 Minutes (2nd Edition)

The iPad 2 and the original iPad, taken together, are the biggest thing to hit computing in years. Drawing on the best of Apple’s iPhone and iPod touch products, and Apple’s Macintosh personal computers, while introducing a whole new way of seeing and interacting with information, the two new devices have grabbed the...

Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Over the last five years or so a revolution has taken place, and continues to do so, that is changing the way we communicate and interact with each other and our environment. The advent of the Internet and the ubiquitous presence of mobile personal communications systems are the most prominent examples of this. The Internet has made it possible to...
Txtng: The Gr8 Db8
Txtng: The Gr8 Db8
He combines an extraordinary knowledge of linguistics with a gift for popularizing. TLS. A highly consumable work of pop linguistics. Los Angeles Times Excellent. Crystal presents a compelling argument in favour of texting as a force for linguistic ability. Melissa Katsoulis, The Times

"Reports of the demise of the
...
Organic Semiconductors in Sensor Applications (Springer Series in Materials Science)
Organic Semiconductors in Sensor Applications (Springer Series in Materials Science)
Organic semiconductors offer unique characteristics such as tunability of electronic properties via chemical synthesis, compatibility with mechanically flexible substrates, low-cost manufacturing, and facile integration with chemical and biological functionalities. These characteristics have prompted the application of organic semiconductors and...
Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

unlimited object storage image
Result Page: 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy