|
|
|
|
EDGE for Mobile InternetThis ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become... | | The Focal Easy Guide to Final Cut Pro 6"This book will help you learn how to use Final Cut Pro 5 quickly and confidently." - Stills Audio Motion
"In such a relatively short book as compared to the 800 page tomes I usually find, there is not much that Rick Young does not cover in order to get the new user up and running as soon and as painlessly as... | | MacIntosh Technology in the Common Hardware Reference PlatformThis book presents specifications and standards for the Apple Macintosh technology cited in the PowerPC Microprocessor Common Hardware Reference Platform (CHRP) specification.
The CHRP specification is a joint publication of Apple Computer, Inc., International Business Machines Corporation, and Motorola, Inc. It defines a common hardware... |
|
|
Mastering LOB Development for Silverlight 5: A Case Study in Action
Line of Business applications. Think about this term for a moment—Line of
Business. Yes, Business. Business means change. Changes are happening faster
than we usually think it is possible. How can we deal with it? With the right set
of knowledge and tools, of course!
Business, nowadays, is more demanding... | | Quartz 2D Graphics for Mac OS X(R) DevelopersOn Mac OS X, Macintosh developers depend on the graphics and imaging frameworks of the Core Graphics system to implement multimedia features in their applications. With Core Graphics Apple has answered the increasing demands of graphics developers with a powerful collection of tools, including Quartz 2D and Core Image. Quartz 2D is a modern drawing... | | The Mac Hacker's HandbookAs more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat... |
|
|
|
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 |