Home | Amazing | Today | Tags | Publishers | Years | Search 
XML in Flash (Sams Other)
XML in Flash (Sams Other)
XML in Flash is an excellent introduction to creating state-of-the-art Flash applications with XML. XML is quickly becoming the most popular way to store and manage data. Flash's XML Socket makes it possible to network Flash front-ends to an application server. This allows developers to use a Flash interface for applications such as message boards,...
SMIL: Adding Multimedia to the Web
SMIL: Adding Multimedia to the Web
Synchronized Multimedia Integration Language (SMIL), an XML-based language, allows designers to synchronize and position video, pictures, animations, audio, and text to stream presentations via the Web. Recently, the W3C finalized SMIL 2.0, which offers a more advanced set of controls. Although RealPlayer, QuickTime and Internet Explorer all...
The Wireless Application Protocol (WAP): A Wiley Tech Brief
The Wireless Application Protocol (WAP): A Wiley Tech Brief
Discover how to utilize the latest WAP technologies to meet your business needs With wireless services rapidly exploding worldwide, WAP is becoming the most talked about standard for wireless applications. In this accessible book, mobility experts Steve Mann and Scott Sbihli cut through the buzz and the jargon surrounding the technology to provide...
The Art of Strategic Planning for Information Technology, 2nd Edition
The Art of Strategic Planning for Information Technology, 2nd Edition
The acclaimed IT strategic planning methodology now completely revised for the new millennium!

Bernard Boar, internationally recognized expert and IT consultant for Fortune 500 companies, overhauls his bestselling book on IT strategy to help IT professionals take on the new challenges of the hyper-competitive digital age. From assessing your...

Positive Trigonometric Polynomials and Signal Processing Applications (Signals and Communication Technology)
Positive Trigonometric Polynomials and Signal Processing Applications (Signals and Communication Technology)
"The book under review is a new contribution on the topic, with a focus on signal processing applications. … this is the first self-contained manuscript on this emerging research area, and hence it is a welcome and timely contribution to the technical literature. … use of illustrative numerical examples, accompanied by Matlab...
Space-Time Codes and MIMO Systems
Space-Time Codes and MIMO Systems
This book is intended to introduce space-time coding and multiantenna systems. The endeavor is to impart a working knowledge of the subject not just for students and researchers but for the entire wireless community.

The birth of multiantenna systems is the direct result of the long-standing struggle to achieve data rates without
...
Java 2 Micro Edition: Professional Developer's Guide
Java 2 Micro Edition: Professional Developer's Guide

The ultimate guide to programming handheld and embedded devices

Can Java be used effectively on small computing devices? Absolutely, says expert Eric Giguère, as he introduces Java™ 2 Micro Edition (J2ME)–the new release from Sun Microsystems designed specifically to run on small computing devices like cellular...

Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Imaging Beyond the Pinhole Camera (Computational Imaging and Vision)
Imaging Beyond the Pinhole Camera (Computational Imaging and Vision)
The world's first photograph was taken in 1826 using a pinhole camera, known as camera obscura. The camera obscura, the basic projection model of pinhole cameras, was already known in China more than 2500 years ago. Cameras used since this first photograph are basically following the pinhole camera principle. The quality of projected images...
Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

Upgrading Your Home PC
Upgrading Your Home PC
With the Right Resource, Upgrading’s Easier than You Think

Ever feel like PC technologies evolve so quickly that your own machine is out of date just months after you get it? Now you can keep up without taking it to a professional, without getting in trouble, and without buying a new one. Upgrading Your Home...

Result Page: 279 278 277 276 275 274 273 272 271 270 269 268 267 266 265 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy