Home | Amazing | Today | Tags | Publishers | Years | Search 
Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Video Games (Technology 360)
Video Games (Technology 360)

The past few decades have seen some amazing advances in technology. Many of these changes have had a direct and measureable impact on the way people live, work, and play. Communication tools, such as cell phones,  satellites, and the Internet, allow people to keep in constantcontact across longer distances and from the most remote places....

Fix Your Own Computer For Seniors For Dummies
Fix Your Own Computer For Seniors For Dummies

Learn to diagnose and fix simple PC problems with this easy-to-follow guide

When something goes wrong with your computer, it's frustrating and potentially expensive. With Fix Your Own Computer For Seniors For Dummies, you can find out what's wrong, how to fix it, whether you need to call in professional help, and how to practice...

Beginning Smartphone Web Development: Building Javascript, CSS, HTML and Ajax-Based Applications
Beginning Smartphone Web Development: Building Javascript, CSS, HTML and Ajax-Based Applications

I believe in the W3C’s principle of One Web—that services and information on the web should be thematically consistent and accessible to all kinds of devices, without regard to differences in presentation capabilities. Informally, the One Web principle means that if I write my grocery list online at home in Firefox, I should be...

Build a Website for Free
Build a Website for Free

Build a Website for Free

 

Build yourself a state-of-the-art website.It’s incredibly easy... and it won’t cost you a dime! You need a website. But you don’t need the hassles that usually go with building one, or the expense of hiring someone...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)
Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)

People go about their daily tasks with an in-built awareness of their social and physical environments. This awareness helps them to work cooperatively in groups, coordinate actions, and to maintain and enhance social communication with others. Networked technology has extended the reach of people's awareness to remote and distributed groups and...

A Practical Guide to Testing Wireless Smartphone Applications (Synthesis Lectures on Mobile and Pervasive Computing)
A Practical Guide to Testing Wireless Smartphone Applications (Synthesis Lectures on Mobile and Pervasive Computing)
Testing applications for mobile phones is difficult, time-consuming, and hard to do effectively. Many people have limited their testing efforts to hands-on testing of an application on a few physical handsets, and they have to repeat the process every time a new version of the software is ready to test. They may miss many of the permutations of...
LCD Backlights (Wiley Series in Display Technology)
LCD Backlights (Wiley Series in Display Technology)
Research and development on liquid crystal display (LCD) backlight technologies are becoming increasingly important due to the fast growth of the LCD business. Backlight technologies contribute to functional improvements of LCDs in terms of wide colour reproduction, uniformity improvements of luminance and colour temperature, high luminance, long...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Teach Yourself VISUALLY iPhoto '09
Teach Yourself VISUALLY iPhoto '09

A step-by-step visual guide to using all aspects of the iPhoto application

iPhoto does a lot more than just allow you to crop your photos and fix red-eye! Packed with full-color illustrations and designed for those who learn best when they see how things are done, Teach Yourself VISUALLY iPhoto helps you take advantage...

Space Time Play: Computer Games, Architecture and Urbanism: the Next Level
Space Time Play: Computer Games, Architecture and Urbanism: the Next Level
Computer and video games are leaving the PC and conquering the arena of everyday life in the form of mobile applications (such as GPS cell phones, etc.) â the result is new types of cities and architecture. How do these games alter our perception of real and virtual space? What can the designers of physical and digital worlds learn from one...
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy