Home | Amazing | Today | Tags | Publishers | Years | Search 
Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences
Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences
This book is directed to academics, educators, and government policy-makers who are concerned about addressing emerging cyber-bullying and anti-authority student expressions through the use of cell phone and Internet technologies. There is a current policy vacuum relating to the extent of educators' legal responsibilities to intervene when such...
Video Codec Design: Developing Image and Video Compression Systems
Video Codec Design: Developing Image and Video Compression Systems
Video compression coding is the enabling technology behind a new wave of communication applications. From streaming internet video to broadcast digital television and digital cinema, the video codec is a key building block for a host of new multimedia applications and services. Video Codec Design sets out to de-mystify the subject of video...
Beginning Game Graphics (Premier Press Game Development)
Beginning Game Graphics (Premier Press Game Development)
In the distant past, almost all great games were born and bred in the back bedroom. Creativity, and sometimes outright wackiness, reigned supreme. Then, not so long ago, the game business began to look a little more like Hollywood each year. If you couldn’t afford a high-end machine with high-end hardware, speak C like a second language, and...
Learn C on the Mac (Learn Series)
Learn C on the Mac (Learn Series)

Considered a classic by an entire generation of Mac programmers, this popular guide has been completely updated for Mac OS X. Don’t know anything about programming? No problem! Acclaimed author Dave Mark starts out with the basics and takes you through a complete course in programming C using Apple’s free Xcode...

Laptops For Dummies (Computer/Tech)
Laptops For Dummies (Computer/Tech)
Laptops For Dummies, 3rd Edition shows you how to use your laptop to its fullest potential, from how to purchase a laptop and what to do when you first open the box to how to keep your laptop safe and running smoothly.

You will discover how to choose and purchase the right laptop for you, how to set up and maintain your laptop,...

Network Dictionary
Network Dictionary
Networking, Internet, telecom, wireless, computer, hardware and software multiple dictionaries in one. A ""Must have"" reference for IT/Networking professionals and students!

About the Author

Javvin Technologies Inc., based at the Silicon Valley of California USA, is leading
...
The Software Vulnerability Guide (Programming Series)
The Software Vulnerability Guide (Programming Series)
In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT...
The Handy Anatomy Answer Book (The Handy Answer Book Series)
The Handy Anatomy Answer Book (The Handy Answer Book Series)
Pick up a magazine or newspaper, turn on the radio or television, or access medical and health information on the Internet and you will find that the human body is definitely in the news. Artificial hearts, dietary supplements, stem cell research, genetic engineering, arthroscopic surgery, and many other intriguing subjects on human biology and...
MacBook For Dummies (Computer/Tech)
MacBook For Dummies (Computer/Tech)
Got a new MacBook, MacBook Air, or MacBook Pro? Want the scoop on Mac laptop basics, using Mac OS X Leopard, networking a laptop, or connecting your laptop to wireless devices? There’s no better place to find what you need than MacBook For Dummies, 2nd Edition!

With your Mac laptop, you can take your movies, music,...

Networking (2nd Edition) (Networking Technology)
Networking (2nd Edition) (Networking Technology)

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical...

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to...

Windows Vista® Resource Kit, Second Edition
Windows Vista® Resource Kit, Second Edition
Get the definitive reference for deploying, configuring, and supporting Windows Vista with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Vista Team at Microsoft. With additions and updates for SP1, this official Microsoft RESOURCE KIT provides more than 1,700 pages of in-depth technical guidance on automating...
Result Page: 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy