Unboxing Android USB: A hands on approach with real world examples
If you are a multimedia developer on Android platform you need USB for media transfer or playback audio. This book explores MTP and USB Audio in both USB device and USB host mode.
If you are an core developer who work on charging you need to understand USB charging specification which is explained in the book,
Jump Start Git
Get a Jump Start on version control with Git today!
Most engineers we meet prefer Git over other distributed version control systems.
These systems let you store different versions of project files and directories, so you can roll back to an earlier one if something goes wrong. And since they're...
This reference supplies a comprehensive and current overview of every aspect of gastrointestinal microbiota. Expertly written chapters cover conventional and molecular techniques for the study of differing microbial populations, as well as the analysis of microbial activity and interaction with host bodies. Illustrative and up-to-date, this...
Embedded Systems: Desktop Integration (Wordware Applications Library) In this book, we design a thermostat that interfaces to a host
system through RS-232, USB, and Ethernet. To make things fun,
the device layer and user applications have to run on Windows,
Linux, and FreeBSD. We build three prototype thermostats using
the BASIC Stamp, PIC Microcontroller, and PSOC Microcontroller.
BlackBerry Pearl For Dummies (Computer/Tech) Manage your contacts, appointments, e-mail, and media
Find out how to do a string of things with your BlackBerry Pearl!
It's a fact — your BlackBerry Pearl can do almost anything except bake a pie — but you can use it to e-mail a recipe!
Add Audio and Video to Your Site: The Mini Missing Manual
Nothing spices up a website like a cool sound effect (think ker-thunk as a visitor presses a button) or an embedded video. In this Mini Missing Manual, you’ll learn how to add several kinds of media files to your site: background music, a MIDI player, sound effects, and videos.
You’ll also find out where you can...
Next Generation Excel: Modeling in Excel for Analysts and MBAs (Wiley Finance)
Rutgers professor, Dr. Isaac Gottlieb demonstrates an array of advanced financial and accounting functions in this practical Excel modeling book. He shows how to quickly create models that deliver accurate, relevant information related to efficiency, forecasting, and a host of other business and reporting issues. This book describes how Excel...
ACT! 2005 For Dummies Catch this new ACT! and build better relationships
Organize customer information, schedule activities, create reports, and more
It’s time to ACT! on your intention to improve customer relationship management! ACT! 2005 offers great new tools, and with this book in hand, you have a top expert showing you how to use them....
J2EE and XML Development
Geared toward experienced developers, this reference demonstrates how Java 2 Platform, Enterprise Edition (J2EE), and XML technologies can be used together to create more robust distributed applications and software systems. The use of XML technology to extend and enhance the capabilities of the J2EE platform is covered in detail. Discussed...
Biology Demystified (TAB Demystified) Guide to understanding basic and applied scientific information, for those who've had not formal training in biology. Includes more than 150 illustrations, a pronunciation guide, self-tests, and reviews. Softcover. DLC: Biology.
UNDERSTAND BIOLOGY -- WITHOUT DISSECTING ANYTHING!
If you're years removed...
Using Samba, Second Edition Using Samba, Second Edition is a comprehensive guide to Samba administration. This new edition covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores... HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...
|Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 |