Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies
Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,...
XHTML by Example explains the differences in syntax between HTML and XHTML, and the concept of 'well-formedness', which is underused in HTML but crucial and required in XHTML. Further coverage includes authoring guidelines for a smooth transition to XHTML, XML DTDs and Schemas, and how they relate to XHTML, how XHTML modularization provides...
When Linux or Unix gets adopted by computing groups that already have users working with a version of the Windows platform, administrators overseeing the network integration of the two operating systems look to Samba to make a connection. Sams Teach Yourself Samba in 24 Hours furnishes 24 one-hour essential lessons geared toward...
The ultimate guide to programming handheld and embedded devices
Can Java be used effectively on small computing devices? Absolutely, says expert Eric Giguère, as he introduces Java™ 2 Micro Edition (J2ME)–the new release from Sun Microsystems designed specifically to run on small computing devices like cellular...
Going Wireless delivers the unexpected by showing how wireless is transforming every type of enterprise from micro-businesses to multi-national conglomerates.
Award-winning technology journalist Jaclyn Easton begins with an in-depth look at owning your customers and clients through mobile commerce -- whether your company focuses on...
The new Windows 2000 MCSE certification track is here! And Sybex, the leader in certification self-study material, has what you need to approach the exams with confidence. The MCSE: Windows 2000 Upgrade Study Guide provides in-depth coverage of all official exam objectives for this new elective exam. In addition to the practical, real-world...
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Windows Phone, updated in Windows Phone 7.5, presents an exciting opportunity for developers to
build and monetize mobile applications. It represents a major new investment into mobile computing
by Microsoft, and in many ways is a major break from the past. To build applications for Windows
Phone, it is important to understand its...
Originally published in 1967, Pa-Kua was the West’s first look into the esoteric Chinese martial arts. It has been a valued and sought after text ever since. It was put out of print in the 1970s, but since that time interest in the martial arts have continued to skyrocket. Pa-Kua gives an introduction to the little known...
The way we interact with machines is always changing. As technology evolves, new
ways of interacting with computers become available to us, one innovative breakthrough
after the next. If we go back 10 years, RIM was just starting to implement
phone capabilities into their line of Blackberry mobile devices. Now we...
Games have come a long way since their inception far in our past.
The tools we have used in our game play have changed, as well, from knuckle
bones to cards to board games to early arcade games to today’s spiffy video game
consoles. The progression has been a lengthy one. Now hardware advances are
even changing the way we...
Bridging the gap between the palm-sized iPod touch and a full-sized computer, Apple's iPad offers enough screen area and horsepower to perform the day-to-day tasks most people want to do. Packed with practical knowledge, this book will walk readers through how to manage their most common projects, from the simple (setting up a calendar...