 |
|
|
|
|
|
 PNG: The Definitive Guide (O'Reilly Nutshell)PNG (Portable Network Graphics) is the next-generation graphics file format for the Web. Designed as an open-source format to replace the proprietary GIF format, PNG is better, smaller, more extensible, and free. Already supported by major software like Macromedia Fireworks, Adobe Photoshop, and Microsoft Office, as well as Netscape... |  |  Security for Wireless Ad Hoc NetworksWireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... |  |  Adobe Acrobat 6 PDF for DummiesCovers accessing and distilling PDF files; converting Microsoft Office documents; capturing paper documents and Web pages; printing, annotating, editing and securing PDF files; extracting text and graphics; cataloging and distributing PDF files; creating interactive forms; and building multimedia presentations.
... |
|
 SQL Server 2005 Reporting EssentialsSQL Server 2005 Reporting Services lets you create, manage, and deliver a variety of report types that contain data from relational and multidimensional data sources as well as any data source that has a .NET Framework managed data provider, an OLE DB data provider, or an ODBC provider.
You can create... |  |  Peopleware: Productive Projects and Teams (3rd Edition)
“Peopleware has long been one of my two favorite books on software engineering. Its underlying strength is its base of immense real experience, much of it quantified. Many, many varied projects have been reflected on and distilled; but what we are given is not just lifeless distillate, but vivid examples from... |  |  Buffer Overflow AttacksBuffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have... |
|
|
Result Page: 126 125 124 123 122 121 120 119 118 117 |