|
|
|
|
XHTML EssentialsWith Web access becoming available through TV, handheld devices, and even phones, developers need to create sites that can be viewed from different environments, not just from the desktop. Introducing XHTML, the next generation HTML, this practical guide jumpstarts Web developers on the technology that ensures that their Web pages stay true-to-form... | | Augmented Learning: Research and Design of Mobile Educational GamesNew technology has brought with it new tools for learning, and research has shown that the educational potential of video games resonates with scholars, teachers, and students alike. In Augmented Learning, Eric Klopfer describes the largely untapped potential of mobile learning games--games played on such handheld devices as cell phones,... | | Beginning Android 4 (Beginning Apress)
Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars, in in-flight entertainment systems on planes, and even in
robots!
However, the general theme of Android devices will be smaller screens and/or no
hardware keyboard. And, by the numbers, Android ... |
|
Sams Teach Yourself Wireless Java with J2ME in 21 DaysSams Teach Yourself Wireless Java with J2ME in 21 Days begins by establishing the basic parameters of J2ME development and its uses in building wireless applications. The tutorial chapters introduce both text and graphical application development for typical wireless devices. Finally, the book presents the major types of... | | Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions... | | Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
-
Learn how mobile devices are monitored and the impact of cloud computing
... |
|
|
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 |