Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Network Hacks & Mods For Dummies
Wireless Network Hacks & Mods For Dummies
Connect the old, the new, the practical, and the fun!

Play multiplayer games, set up home surveillance, or take your network outside

Now that you've got a wireless network going, you're getting the urge to see what else it can do, right? Hook up with this book and find simple, fun ways to expand its possibilities. Add your home...

Scalable Continuous Media Streaming Systems: Architecture, Design, Analysis and Implementation
Scalable Continuous Media Streaming Systems: Architecture, Design, Analysis and Implementation
Continuous media streaming systems will shape the future of information infrastructure. The challenge is to design systems and networks capable of supporting millions of concurrent users. Key to this is the integration of fault-tolerant mechanisms to prevent individual component failures from disrupting systems operations. These are just some of...
Visio 2003 Bible
Visio 2003 Bible
If Visio 2003 can do it, you can do it, too...

Whether you’re designing a network, a business model, or an office building, Visio 2003 helps you transform your vision into something tangible. This comprehensive reference teaches you to use this powerful combination of simple concepts and straightforward tools. You’ll discover new...

Web Site Privacy with P3P
Web Site Privacy with P3P
Introducing the long-awaited first step to personal privacy on the Web!

Privacy on the Internet is a very complicated–and delicate–subject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server....

Software That Sells : A Practical Guide to Developing and Marketing Your Software Project
Software That Sells : A Practical Guide to Developing and Marketing Your Software Project
Purchasing this book could change your future
  • Recognize a good idea and gauge its chances
  • Analyze and research your market
  • Learn what investors look for in a business venture
  • Make your planning pay
  • Pick a winning team
  • Know when to reach for ready-mades
  • ...
Now You Know Treo
Now You Know Treo
Even a smartphone needs a smart user to take advantage of all of its brillianceespecially when that phone is as jam-packed with features as the Treo. To master all of the Treo's phone, email, Internet, photographic, and organizational capabilities, you need this pocket-sized guide! As the only Treo guide authorized by its maker (palmOne), this one...
Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management

The Definitive Guide to Protecting Enterprise Data

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...

Anywhere Computing with Laptops: Making Mobile Easier (One-Off)
Anywhere Computing with Laptops: Making Mobile Easier (One-Off)
You bought your Centrino laptop computer because of its ease-of-use and portability. But are you using your laptop to its maximum potential? Anywhere Computing with Laptops: Making Mobile Easier will show you what to expect when buying and configuring your laptop and how to use built-in features such as digital...
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

Pro OpenSSH
Pro OpenSSH

SSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment.

Some of the...

Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems
Wireless Communications over MIMO Channels: Applications to CDMA and Multiple Antenna Systems
Mobile radio communications are evolving from pure telephony systems to multimedia
platforms offering a variety of services ranging from simple file transfers and audio and
video streaming, to interactive applications and positioning tasks. Naturally, these services
have different constraints concerning data rate, delay, and
...
Result Page: 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy