|
|
|
|
Schaum's Easy Outline Differential EquationsBoiled-down essentials of the top-selling Schaum's Outline series, for the student with limited time
What could be better than the bestselling Schaum's Outline series? For students looking for a quick nuts-and-bolts overview, it would have to be Schaum's Easy Outline series. Every book in this series is a pared-down,... | | MySQL and JSON: A Practical Programming Guide
Practical instruction on using JavaScript Object Notation (JSON) with MySQL
This hands-on guide teaches, step by step, how to use JavaScript Object Notation (JSON) with MySQL. Written by a MySQL Community Manager for Oracle, MySQL and JSON: A Practical Programming Guide... | | Hacking Exposed WirelessSecure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute... |
|
How to Do Everything with Your iPAQ Pocket PCNow you can do more with your HP iPAQ Pocket PC than you ever thought possible. Use this step-by-step guide to discover all the essentials about your iPAQ and put it to work with a thorough exploration of its hardware, software, and accessories. Learn how to use your iPAQ as a portable entertainment station for music, movies and games. Find out how... | | ESD : RF Technology and CircuitsThe phenomenon of electrostatic discharge (ESD) has been known for a long time, but recently a growing interest has been observed in ESD in radio frequency (RF) technology and ESD issues in RF applications.
Why now?
Early telecommunications started with William Cooke and Charles Wheatstone in the development of the electric... | | |
|
Personal Computing DemystifiedWelcome to the personal computing adventure—and it is an adventure. You might be surprised to learn that few people, even the word wizards who write dictionaries and encyclopedias, attempt to define personal computing. It’s one of the phrases we just accept, thinking it has something to do with personal computers (PCs).And, it does.... | | | | |
|
| | Hardening Windows SystemsTake a proactive approach to network security by hardening your Windows systems against attacks before they occur. Written by security evangelist Roberta Bragg, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Whether you have one Windows server or one hundred,... | | |
|
|
Result Page: 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 |