Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional NFC Application Development for Android
Professional NFC Application Development for Android

A practical guide to developing and deploying Near Field Communication (NFC) applications

There has been little practical guidance available on NFC programming, until now. If you're a programmer or developer, get this unique and detailed book and start creating apps for this exciting technology. NFC enables contactless...

Public Speaking: The Evolving Art (with CourseMate with Interactive Video Activities, Speech Studio™, Audio Study Tool, SpeechBuilder Express, InfoTrac 1-Semester Printed Access Card)
Public Speaking: The Evolving Art (with CourseMate with Interactive Video Activities, Speech Studio™, Audio Study Tool, SpeechBuilder Express, InfoTrac 1-Semester Printed Access Card)

PUBLIC SPEAKING: THE EVOLVING ART is the first book and integrated technology package to meet the expectations of today's students while both preserving and offering innovative variations on the well-respected traditions of public speaking instruction. Throughout the text, readers benefit from the examples of four peer mentors--real...

JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures
JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures
We have seen the revolution in computer and communication technologies in the twentieth century. The telecommunications industry has gone through sea-changes from analog to digital networking that enabled today’s very powerful Internet technology. Transition from the analog to the digital world offered many opportunities in every walk of...
iPhone and iPad in Action
iPhone and iPad in Action

iPhone and iPad In Action, compiled by mobile software developer and blogger Brandon Trebitowski, simplifies existing iPhone topics while also updating them to account for the 3.4 SDK framework including iPad coverage. Beyond covering the basics of iPhone development, this edition also explores exciting topics such as the...

Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India (Advances in Intelligent Systems and Computing)
Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India (Advances in Intelligent Systems and Computing)

This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer...

Recent Developments in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2017 (Advances in Intelligent Systems and Computing, 752)
Recent Developments in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2017 (Advances in Intelligent Systems and Computing, 752)

This book offers a collection of high-quality, peer-reviewed research papers presented at the International Conference on Intelligent Computing, Communication and Devices (ICCD 2017), discussing all dimensions of intelligent sciences – intelligent computing, intelligent communication, and intelligent devices.

...

Windows Communication Foundation Unleashed (WCF)
Windows Communication Foundation Unleashed (WCF)
Windows Communication Foundation (WCF) is a new Microsoft technology for allowing software to communicate. Superseding earlier technologies, such as COM/DCOM, .NET Remoting, ASP.NET Web Services, and the Web Services Enhancements for .NET, WCF provides a single solution that is designed to always be the best way to exchange data among software...
Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
IBM InfoSphere Replication Server and Data Event Publisher
IBM InfoSphere Replication Server and Data Event Publisher

Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many...

CCNP Practical Studies: Routing
CCNP Practical Studies: Routing

Practice for the CCNP BSCI exam with hands-on, networking lab scenarios

  • Ramp up your routing know-how with more than 40 practical lab scenarios
  • Reinforce your CCNP exam preparation with step-by-step, hands-on router configuration
  • Get up to speed with advanced OSPF and IS-IS configuration,...
More iOS 6 Development: Further Explorations of the iOS SDK
More iOS 6 Development: Further Explorations of the iOS SDK

Interested in iPhone and iPad apps development? Want to learn more? Whether you’re a self-taught iPhone and iPad apps development genius or have just made your way through the pages of Beginning iOS 6 Development, we have the perfect book for you.

More iOS 6 Development: Further Explorations of the...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy