|
|
|
|
|
Absolute Beginner's Guide to iPod and iTunesIf you have been toying with the idea of getting into digital music…. If you have an iPod and aren’t sure what to do with it…. If you wish you had a good way to stop messing around with a bunch of CDs when you want to listen to music…. If you’ve heard great things about iPods, have seen the... | | Under Control: Governance Across the EnterpriseWith the economic crisis that began in 2008, a long-standing trend toward increased regulation is becoming a flood. The clamor for improved enterprise risk management and the complexity of multinational compliance present executives with a dramatically new array of challenges.
Governance should offer solutions, but it is clear that... | | Ajax Starter Kit
Ajax Programmer’s Toolkit with all the technologies you need to set up an Ajax development and testing environment on your Windows, Mac, or Linux computer.
Quick Start Guide teaches you the basics of Ajax programming in 21 short, easy-to-read... |
|
Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Information is the most valuable resource in the 21st century. Whether for a
consumer looking for a restaurant in San Francisco, a small business woman checking
textile prices in Bangalore, or a financial services executive in London studying
stock market trends, information at the moment of decision is key in providing the... | | Future Cities: Designing Better, Smarter, More Sustainable and Secure Cities
In Future Cities, three authors - futurists, urban experts and systems architects - consider how the demands of the 21st Century will reshape the places where half of the world's population lives. From the history of urban development to the challenges of climate change and terrorism, they show how technology advances have shaped cities... | | Testing Code Security
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and... |
|
|
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 |