|
|
|
|
|
| | Underlord (Cradle)
A tournament approaches. All around the world, great clans and sects prepare their disciples to fight against one another in a competition of young Underlords.Even the Blackflame Empire is drawn in, but their youth are not strong enough to compete.Yet.... | | |
|
Wi-Fi Handbook: Building 802.11b Wireless NetworksDetailing the design and deployment of 802.11b networks in every flavor and size, this working handbook delivers the hands-on expertise you need—complete with illustrative case studies. From one-cell home systems to global provider networks, Wi-Fi Handbook provides the A-Z facts, details, tips, and strategies you need to... | | MCSE Windows XP Professional Exam Cram 2 (Exam 70-270) (2nd Edition)The MCSE 70-270 Exam Cram 2: Windows XP Professional, Second Edition is an efficient, effective and concise guide that gives you exactly what you need to know to pass one of the most popular exams in the MCSE program. Organized according to the exam objectives, you will be able to quickly and easily assess your... | | Developing Enterprise Applications - An Impurist's ViewDeveloping Enterprise Applications using Using VB6, MTS, SQLServer and IIS- An Impurist's View shows software architects, developers and managers how to apply both common and lesser known patterns and framework components to create flexible, global enterprise applications using Microsoft's tools and technologies. Along the way, you will see hints,... |
|
Computer Network SecurityA comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and... | | Google Maps Mashups with Google Mapplets (Firstpress)Have a Google Maps mashup that you’d like to expose to millions of users on maps.google.com? New to the mapping craze, but have an idea for a killer map–based application? Want to learn how to create GeoRSS and KML feeds with your geotagged content, exposing your customer to new ways of exploring and navigating your content?... | | Software for Dependable Systems: Sufficient Evidence?Critical systems are often subject to certiication: a formal assurance that the system has met relevant technical standards designed to ensure it will not unduly endanger the public and can be depended upon to deliver its intended service safely and securely. Today, certiication1 of the dependability of a software-based system usually relies more... |
|
|
Result Page: 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 |