|
|
|
|
|
802.11 WLANs and IP Networking: Security, QoS, and MobilityEven after all the earthly riches are enjoyed there still remains in the heart a longing for knowledge, true knowledge. It is this longing and the desire to bring the knowledge to others that resulted in the revelation of this book.
“How do IEEE 802.11 wireless local area networks (WLANs) work together with the... | | Making Sense of Motherhood: A Narrative ApproachBecoming a mother changes lives in many ways, and this book explores how women try to make sense of, and narrate their experiences of, first-time motherhood in industrialized society. It charts the social, cultural and moral contours of contemporary motherhood and engages with sociological and feminist debates on how selves are constituted,... | | Software Architecture Design Patterns in Java Partha Kuchana is an experienced enterprise systems architect. He understands that patterns are not about things that are just good ideas, but that patterns are about capturing knowledge bred from experience. This hard-won knowledge is what Partha is sharing with readers of his book. Here are some of the things I really like about what he has... |
|
George Silverman's ExplanationWHAT do I know of Hoghton Towers? Very little; for I have been gratefully unwilling to disturb my first impressions. A house, centuries old, on high ground a mile or so removed from the road between Preston and Blackburn, where the first James of England, in his hurry to make money by making baronets, perhaps made some of those remunerative... | | Mfc Black BookAre you an MFC programmer? Good. There are two types of MFC programmers. What kind are you? The first kind are the good programmers who write programs that conform to the way MFC wants you to do things. The second bunch are wild-eyed anarchists who insist on getting things done their way. Me, I’m in the second group. If... | | Professional Web 2.0 Programming (Wrox Professional Guides)Web 2.0 architecture opens up an incredible number of options for flexible web design, creative reuse, and easier updates. Along with covering the key languages and techniques of Web 2.0, this unique book introduces you to all of the technologies that make up Web 2.0 at a professional level. Throughout the chapters, you'll find code for several... |
|
Syngress Force 2006 Emerging Threat Analysis: From Mischief to MaliciousOver the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... | | Build Your Own Ruby on Rails Web ApplicationsRuby on Rails has shaken up the web development industry in a huge way—especially when you consider that version 1.0 of Rails was only released in December 2005. The huge waves of enthusiasm for the new framework, originally in weblogs and later in the more traditional media, are probably the reason why this book is in your hands.
... | | |
|
|
Result Page: 851 850 849 848 847 846 845 844 843 842 841 840 839 838 837 836 835 834 833 |