|
|
|
|
| | Microsoft Lync Server 2010 Unleashed
This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified... | | SyncML: Synchronizing and Managing Your Mobile DataEffective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a... |
|
Palm webOS
This is the official guide to building native JavaScript applications for Palm's new mobile operating system, Palm® webOS™. Written by Palm's software chief technology officer along with the Palm webOS development team, Palm webOS provides a complete tutorial on the design principles, architecture, UI, tools, and... | | Emerging Business Online: Global Markets and the Power of B2B Internet Marketing
We live in an age of information overload, significantly facilitated by the Internet. Anyone from almost anywhere can send, access, and post information across the globe in a matter of seconds. As applications and technologies continue to evolve, our ability to leverage the Internet will continue to impact the way we work and live.
... | | Embedded Software Development with eCos
In 1997. there were over 100 commercially supported embedded operating systems, none of which had more than a minority share of the overall embedded OS market, not to mention countless thousands of others developed for specific projects (cell phones, radar arrays, networking equipment, etc.) that had no application developer base beyond that... |
|
Cryptography: A Very Short IntroductionWe are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.
In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight... | | Smart Things: Ubiquitous Computing User Experience Design
The world of smart shoes, appliances, and phones is already here, but the practice of user experience (UX) design for ubiquitous computing is still relatively new. Design companies like IDEO and frogdesign are regularly asked to design products that unify software interaction, device design and service design -- which are all the key... | | Biometric Recognition: Challenges and Opportunities
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric... |
|
Signals and Systems using MATLAB
Although it is hardly possible to keep up with advances in technology, it is reassuring to know that in science
and engineering, development and innovation are possible through a solid understanding of basic principles.
The theory of signals and systems is one of those fundamentals, and it will be the foundation of much research
and... | | | | The Essential Guide to Flex 2 with ActionScript 3.0Flex 2 represents something of a revolution in web applications. It is the next evolutionary step of Flash, which has grown from a web animation tool to a powerful enterprise web design and development tool. with nearly 98% of all web browsers and cellular phones running the Flash player needed to use Flash and Flex applications, knowledge of Flex... |
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 |