 |
|
 The 3CX IP PBX Tutorial
Traditional PBX systems have often been expensive and proprietary. With 3CX, you can now create an easy-to-use, complete, and cost-effective phone system on Microsoft Windows. This practical guide offers the insight that a reader needs to exploit the potential that 3CX has to offer.
This practical hands-on book covers everything... |  |  Network Programming in Windows NTSinha explains the use of Windows and Windows NT inter-process communication methods to build applications which can communicate with their counterparts over the network. This book explores the challenges that developers face when they are developing network-aware or client/server programs within the Windows and Windows NT operating systems. ... |  |  The Encyclopedia of Demons and DemonologyThe conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead... |
|
|
 PCs For Dummies, Windows 7 Edition
Get the latest edition of the bestselling PC book on the planet!
What better way to make friends with your new PC than with this new edition of the bestselling PC book in the world? PCs For Dummies, Windows 7 Edition explains the latest Windows operating system in a refreshingly jargon-free way that's loaded with good... |  |  MCTS Windows 7 Configuration Study Guide: Exam 70-680
Prepare for certification in Windows 7 configuration with this all-new study guide
This comprehensive book guides readers through preparation for Microsoft's brand new MCTS: Windows 7, Configuring exam (70-680). You'll find 100% coverage of all exam objectives; practical, real-world scenarios; hands-on... |  |  Professional Cocoa Application Security
The first comprehensive security resource for Mac and iPhone developers
The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to... |
|
|
| Result Page: 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 |