|
|
|
|
Agile For Dummies, IBM Limited Edition
Welcome to Agile For Dummies, IBM Limited Edition. You’ve
probably been hearing about agile for a long time, which isn’t
surprising. If you’re not using agile methods already though, or
if you’ve only been exposed to agile on small projects here and
there, you may wonder how to get started with it. Can... | | Wireless Sensor Networks (Artech House Mems and Sensors Library)Our society is awash in “machine intelligence” of various kinds, from smart thermostats in our homes, to expert systems and design aids in our workplaces, to jet aircraft landing safely in treacherous weather under computer control. Over the last century, we have witnessed more and more of the “drudgery” of... | | jQuery UI 1.7: The User Interface Library for jQueryModern web application user interface design requires rapid development and proven results. jQuery UI, a trusted suite of official plugins for the jQuery JavaScript library, gives you a solid platform on which to build rich and engaging interfaces with maximum compatibility, stability, and a minimum of time and effort.
jQuery UI has a... |
|
|
|
Computer Forensics: Computer Crime Scene Investigation (Networking Series)The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package... | | Linux (Hacking Exposed)From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...
Learn how to think like a hacker in order to secure your Linux network
In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software... | | Web Hacking: Attacks and Defense"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |