Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Palm OS Programming Bible (With CD-ROM)
Palm OS Programming Bible (With CD-ROM)
In 1992, Palm Computing (now Palm, Inc.) was founded. The rest is history. Of course, there’s a lot more to it. Many good decisions were made, and many bad designs were thrown out. Palm started as a software company intending to influence existing handheld manufacturers with its easy-to-use software and synchronization...
How to Feed Friends and Influence People: The Carnegie Deli...A Giant Sandwich, a Little Deli, a Huge Success
How to Feed Friends and Influence People: The Carnegie Deli...A Giant Sandwich, a Little Deli, a Huge Success
the show--and the deli--must go on
In the early morning hours of February 7th, the Carnegie Deli experienced its most unusual takeout order: armed robbers wanted the cash.
The deli always stayed open until 4 a.m. and then re-opened its doors at 6 a.m. The seven robbers must have canvassed the place or received an inside tip about the
...
Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Handbook of Neurochemistry and Molecular Neurobiology: Neuroimmunology
Handbook of Neurochemistry and Molecular Neurobiology: Neuroimmunology

Neuroimmunology is one of the most rapidly developing branches of Neurobiology, prompted by novel neurochemical, neuroendocrinological, and neurophysiological investigations of the central and peripheral nervous system including neuroendocrine systems. Neuroimmunology can be considered as an interdisciplinary science that covers relevant...

Web Mobile-Based Applications for Healthcare Management
Web Mobile-Based Applications for Healthcare Management
In recent years, there has been a veritable literary frenzy on the theme of healthcare and the Internet. In these works, however, there has not been adequate attention paid to the role that potential users of the site (patients, general practitioners, healthcare personnel, students, private doctors, other healthcare organizations, etc.) could and...
The School of History: Athens in the Age of Socrates
The School of History: Athens in the Age of Socrates

History, political philosophy, and constitutional law were born in Athens in the space of a single generation--the generation that lived through the Peloponnesian War (431-404 b.c.e.). This remarkable age produced such luminaries as Socrates, Herodotus, Thucydides, Sophocles, Euripides, Aristophanes, and the sophists, and set the stage for the...

Mastering phpMyAdmin 3.3.x for Effective MySQL Management
Mastering phpMyAdmin 3.3.x for Effective MySQL Management

phpMyAdmin is an open source tool written in PHP. It handles the administration of MySQL over the World Wide Web (WWW). It can perform various tasks, such as creating, modifying, or deleting databases, tables, fields, or rows. It can also execute SQL statements and manage users and their permissions. When it comes to exploiting phpMyAdmin to...

Ballantine Books.How to Wow: Proven Strategies for Presenting Your Ideas, Persuading Your Audience, and Perfecting Your Image
Ballantine Books.How to Wow: Proven Strategies for Presenting Your Ideas, Persuading Your Audience, and Perfecting Your Image

“The invaluable advice in How to Wow guarantees your success in any meeting situation, from the boardroom to the breakfast table.”
–Keith Ferrazzi, author of Never Eat Alone

In today’s fast-paced world, where an elevator ride with your CEO can turn into an impromptu meeting, your lunch
...

Isaac Beeckman on Matter and Motion: Mechanical Philosophy in the Making
Isaac Beeckman on Matter and Motion: Mechanical Philosophy in the Making

The contribution of the Dutch craftsman and scholar Isaac Beeckman to early modern scientific thought has never been properly acknowledged. Surprisingly free from the constraints of traditional natural philosophy, he developed a view of the world in which everything, from the motion of the heavens to musical harmonies, is explained by...

Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Recruited by British Intelligence to infiltrate the IRA and Sinn Féin during the height of the Northern Ireland Troubles, they were ‘agents of influence’. With codenames like INFLICTION, STAKEKNIFE, 3007 and CAROL, these spies played a pivotal role in the fight against Irish republicanism. Now, for the first time,...
CSS Fonts
CSS Fonts

From custom fonts to ad-hoc font families you assemble out of a variety of individual faces, CSS 3 gives you more typographic options than ever before. This concise guide shows you how to use CSS properties to gain a fine-grained and wide-ranging influence over how you display fonts on the Web.

Short and sweet, this book...

unlimited object storage image
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy