|
|
|
|
MEMS: Introduction and Fundamentals (Mechanical Engineering)As our knowledge of MEMS continues to grow, so does The MEMS Handbook. The field has changed so much that this Second Edition is now available in three volumes. Individually, each volume provides focused, authoritative treatment of specific areas of interest. Together, they comprise the most comprehensive collection of MEMS knowledge available,... | | Frommer's Alaska 2010 (Frommer's Color Complete Guides)
As a child, when my family traveled outside Alaska for vacations, I often met other children who asked, “Wow, you live in Alaska? What’s it like?” I never did well with that question. To me, the place I was visiting was far simpler and easier to describe than the one I was from. The Lower 48 seemed a fairly homogeneous land... | | Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
-
Write your own custom information security tools using Perl and object-oriented Perl modules
-
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
- ...
|
|
|
Linux Network Servers (Craig Hunt Linux Library)Authoritative Answers to All Your Linux Network Server Questions—Specifically for Linux Administrators Tap into Linux's impressive capabilities as a network server. Written by one of the world’s leading Linux system administration experts, Linux Network Servers teaches you,... | | XHTML EssentialsWith Web access becoming available through TV, handheld devices, and even phones, developers need to create sites that can be viewed from different environments, not just from the desktop. Introducing XHTML, the next generation HTML, this practical guide jumpstarts Web developers on the technology that ensures that their Web pages stay true-to-form... | | Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... |
|
|
|
Result Page: 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 |