Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Gsm and Personal Communications Handbook (Artech House Mobile Communications Library)
Gsm and Personal Communications Handbook (Artech House Mobile Communications Library)
Here is the most comprehensive reference available on GSM applications and services that?s intended to build on -- not replace -- the basic technical information in the authors? original bestseller, An Introduction to GSM. The book provides a close-up look at this hot technology, offers in-depth discussions of the features and services available...
It's Never Done That Before: A Guide to Troubleshooting Windows XP
It's Never Done That Before: A Guide to Troubleshooting Windows XP
Most computer problems aren’t that violent or that dramatic, but the
immediate result is often the same: you sit there in a state of shock, staring at
the computer, saying to yourself, “What happened? What should I do now?
It’s never done that before!” This book will tell you how to understand and
fix
...
19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man...

Embedded Systems Handbook (Industrial Information Technology)
Embedded Systems Handbook (Industrial Information Technology)
The purpose of the Embedded Systems Handbook is to provide a reference useful to a broad range of professionals and researchers from industry and academia involved in the evolution of concepts and technologies, as well as development and use of embedded systems and related technologies.

The book provides a comprehensive overview of the
...
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Consumption of media has grown rapidly in the previous decade due to advances in digital technology. In recent years, the wireless industry has seen explosive growth in device capability. Everincreasing computing power, memory, and high-end graphic functionalities have accelerated the development of new and exciting wireless services. Personal...
Web Geek's Guide to the Android-Enabled Phone
Web Geek's Guide to the Android-Enabled Phone
We live in a time when everything in our lives has to do double duty. Cars serve not only as cars but also as traveling offices, and dinner dates become business meetings or event-planning sessions. So it’s no surprise that our devices must also do more than just be a phone, an MP3 player, or a GPS unit. If a device can be all of those, so...
Windows Phone 7 Plain & Simple
Windows Phone 7 Plain & Simple

Congratulations! You now own one of the most original and fun new phones to emerge on the scene in years. (But you knew that already, didn’t you?) Windows Phone 7 represents an exciting new direction for both Microsoft and the evolution of the smartphone, those magical do-everything devices that are part phone, part pocket computer.

...
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...

Linux Network Administrator's Guide (2nd Edition)
Linux Network Administrator's Guide (2nd Edition)
This book was written to provide a single reference for network administration
in a Linux environment. Beginners and experienced users alike should find the
information they need to cover nearly all important administration activities
required to manage a Linux network configuration. The possible range of
topics to cover is
...
Beginning PHP5 (Programmer to Programmer)
Beginning PHP5 (Programmer to Programmer)

PHP5 is the newest version of the preferred language for rapidly creating dynamic Web page content. While its main use is as a cross-platform, HTML-embedded, server-side Web scripting language, it now works equally well when creating multi-tiered applications or XML-based applications as well as Web applications. This book teaches you the...

SWT : The Standard Widget Toolkit, Volume 1 (The Eclipse Series)
SWT : The Standard Widget Toolkit, Volume 1 (The Eclipse Series)

The Standard Widget Toolkit (SWT) is a new class library for creating graphical user interfaces (GUIs) in Java. Created as part of the Eclipse project, SWT allows developers to build efficient, portable applications that directly access the user-interface facilities of the operating systems it is implemented on. This...

unlimited object storage image
Result Page: 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy