Home | Amazing | Today | Tags | Publishers | Years | Search 
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
101 Spy Gadgets for the Evil Genius
101 Spy Gadgets for the Evil Genius
101 SPY DEVICES FOR SERIOUS SNOOPING

This book offers an amazingly awesome and complete collection of professional spy tools that you can build yourself. You can build any project in this thrilling arsenal of spy devices for $30 or less! Not only that, even total beginners to electronics can construct these mind-boggling...

Car Audio For Dummies (Computer/Tech)
Car Audio For Dummies (Computer/Tech)
Welcome to Car Audio For Dummies! My goal in writing this book is to provide you with all the information you need to build the car audio system of your dreams. Whether you want a car audio system that makes it seem as if your favorite band is performing right on top of your dashboard, one that can keep a carload of passengers entertained with...
The University of Google
The University of Google
University teaching is a special job. It is a joy to wake up in the morning knowing that during each working day, an extraordinary event or experience will jut out from the banal rhythms of administration, answering emails and endlessly buzzing telephones. Students, in these ruthless times, desperately want to feel something – anything...
Cybercrime: A Reference Handbook (Contemporary World Issues)
Cybercrime: A Reference Handbook (Contemporary World Issues)
Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. How can a person's identity be stolen? What exactly is a "hacker"? How much damage can a 17...
Digital Video and DSP: Instant Access
Digital Video and DSP: Instant Access
Although there are many variations and implementation techniques, video signals are just a way of transferring visual information from one point to another. The information may be from a VCR, DVD player, a channel on the local broadcast, cable television, or satellite system, the Internet, cell phone, MP3 player, or one of many other sources....
IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

OpenGL(R) ES 2.0 Programming Guide
OpenGL(R) ES 2.0 Programming Guide
Over the years, the “Red Book” has become the authoritative reference for each new version of the OpenGL API. Now we have the “Gold Book” for OpenGL ES 2.0—a cross-platform open standard ushering in a new era of shader programmability and visual sophistication for a wide variety of embedded and mobile devices, from...
ANDROID A PROGRAMMERS GUIDE
ANDROID A PROGRAMMERS GUIDE

Master the Android mobile development platform

Build compelling Java-based mobile applications using the Android SDK and the Eclipse open-source software development platform. Android: A Programmer's Guide shows you, step-by-step, how to download and set up all of the necessary tools, build and tune...

Taking Your iPhone to the Max (Technology in Action)
Taking Your iPhone to the Max (Technology in Action)
Taking Your iPhone to the Max introduces you to the iPhone, Apple’s handheld marvel of a device. Starting with a guide to setting up your iPhone and activating service, Taking Your iPhone to the Max documents each of the iPhone’s built-in applications. You’ll discover how to connect to the Internet, send and receive e-mail, listen...
Professional iPhone and iPod touch Programming: Building Applications for Mobile Safari
Professional iPhone and iPod touch Programming: Building Applications for Mobile Safari
This hands-on, in-depth book introduces developers to the initial release of the iPhone application platform and assists them in creating Web 2.0 applications that operate on the iPhone and integrate with its services. Author Richard Wagner shares his experience as he guides readers through the process of building new applications from scratch and...
Managing Exports: Navigating the Complex Rules, Controls, Barriers, and Laws
Managing Exports: Navigating the Complex Rules, Controls, Barriers, and Laws
“We have met the enemy, and they are us,” said Pogo the Possum. Nowhere is this more true than in exporting.

Exporters walk a narrow line between ever-changing government regulations (ours and others), complex product standards, transportation changes, exchange rate fluctuations, and punitive import duties—all played
...
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy