Home | Amazing | Today | Tags | Publishers | Years | Search 
LWUIT 1.1 for Java ME Developers
LWUIT 1.1 for Java ME Developers
Writing appealing cross-device applications today in Java ME is challenging as implementation differences in fonts, layout, and menus can make your application look and behave very differently on different devices. So far, the only way out has been low-level programming with its associated complexity.

The Lightweight UI Toolkit (LWUIT),
...
Radio-Frequency Electronics: Circuits and Applications
Radio-Frequency Electronics: Circuits and Applications
'This book is wonderfully informative, and refreshingly different from the usual rehash of standard engineering topics. Hagen has put his unique insights, gleaned from a lifetime of engineering and radio science, into this volume and it shows. There's an insight per page, at least for me, that makes it truly enjoyable reading, even for those of us...
A Complete Guide to Technical Trading Tactics: How to Profit Using Pivot Points, Candlesticks & Other Indicators
A Complete Guide to Technical Trading Tactics: How to Profit Using Pivot Points, Candlesticks & Other Indicators
Are you looking for time-tested trading techniques that professional stock index and futures traders use?

Futures and options markets can be profitable arenas for both novice and experienced traders. But to come out on top, you must have a solid understanding of the markets, the technical tools used to trade them, and yourself.

After...

The Digital Photography Book, Volume 3
The Digital Photography Book, Volume 3

I know what you’re thinking: “If this is Part 2, where is Part 1?” Well, Part 1 is actually Chapter One back in volume 2. “Wait a darn minute—you’re pulling that old ‘bait and switch’ scam, right?” No, a bait-and-switch scam is where you see an advertisement for a washer and dryer for a...

The American International Pictures Video Guide
The American International Pictures Video Guide
American International released a tide of low-budget, sensationalistic films aimed at the teenage audience, finding its greatest success in the horror genre. This is a comprehensive guide to AIP movies that are or have been available in home viewing formats such as DVD and VHS. A brief history of the company, which produced movies from the 1950s...
Reading Between the Signs: Intercultural Communication for Sign Language Interpreters 2nd Edition
Reading Between the Signs: Intercultural Communication for Sign Language Interpreters 2nd Edition
Ann Mindess examines a culture not widely understood - American deaf culture. Collectivist and high-context, it contrasts with mainstream individualistic, low-context American culture. Both cultures are examined and the interpreter's role and responsibilities are discussed.

This book provides us with a penetrating look at a subject that,
...
The CSS Anthology: 101 Essential Tips, Tricks & Hacks
The CSS Anthology: 101 Essential Tips, Tricks & Hacks
The CSS Anthology: 101 Essential Tips, Tricks & Hacks is a compilation of best practice solutions to the most challenging CSS problems. The third edition of this best-selling book, published in full color, has been completely revised and updated to cover the latest techniques and newer browsers, including Firefox 3 and Internet Explorer 8.

...

Python Essential Reference (4th Edition)
Python Essential Reference (4th Edition)
Python Essential Reference is the definitive reference guide to the Python programming language — the one authoritative handbook that reliably untangles and explains both the core Python language and the most essential parts of the Python library.

Designed for the professional programmer, the book...

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Ubuntu Netbooks: The Path to Low-Cost Computing (Beginning)
Ubuntu Netbooks: The Path to Low-Cost Computing (Beginning)

Welcome to the cloud for users, where the speed of Ubuntu and the ease of cloud applications unite. You can now speed up your netbook, connect to the world using 3G modems, or make calls using Skype with Ubuntu. You can even change your desktop altogether without having to worry about netbook screen real estate. Now, you will never have to worry...

Powerful Proposals: How to Give Your Business the Winning Edge
Powerful Proposals: How to Give Your Business the Winning Edge
How does a company constantly win more business than its rivals? A key factor is the ability to create proposals that outshine those from even the strongest competitors. Powerful Proposals helps businesses maximize the selling power of their proposals, with proven strategies for going beyond "this is what we do" documents in...
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy