Home | Amazing | Today | Tags | Publishers | Years | Search 
Blackberry Pearl Pocket Guide
Blackberry Pearl Pocket Guide

When I was asked whether I'd be interested in writing a book about the new BlackBerry Pearl, I jumped at the chance. Although I wasn't an active user, I knew a lot about BlackBerries (having used them in the past), and I'd heard that the Pearl was going to be a special device.

I have to admit that although...

Oracle RMAN Pocket Reference
Oracle RMAN Pocket Reference
This book is a quick-reference guide for Recovery Manager (RMAN), Oracle's utility to manage all of your Oracle database backup and recovery activities. This book is not a comprehensive backup and recovery book. It contains an overview of RMAN architecture, shows briefly how to backup and restore databases using RMAN, describes catalog setup...
JavaServer Pages Pocket Reference
JavaServer Pages Pocket Reference
The JavaServer Pages™ (JSP) specification is built on top of
the Java™ servlet specification and is intended to provide for
better separation of the presentation (e.g., HTML markup)
and business logic (e.g., database operations) parts of web
applications. JSP is supported by all major web and application...
MATLAB Primer, Sixth Edition
MATLAB Primer, Sixth Edition
This fifth edition extends the MATLAB Primer, representing the significant features introduced in MATLAB 5 and reflecting a dramatic change in the text . This pocket book serves as an excellent resource for students and engineers requiring a high-level introduction and handy reference to MATLAB 5, helping readers to learn efficiently and...
Smart Cards: The Developer's Toolkit
Smart Cards: The Developer's Toolkit
The technical groundwork has been laid for wide-spectrum exploitation of smart card technology in both commercial and enterprise venues. Our goal in this book is to provide IT managers, system architects, system analysts, and application developers with the basic information about smart card technology that they need to open the tap on the...
Mastering Perl/Tk
Mastering Perl/Tk
Perl/Tk is the marriage of the Tk graphical toolkit with Perl, the powerful programming language used primarily for system administration, web programming, and database manipulation. With Perl/Tk, you can build Perl programs with an attractive, intuitive GUI interface with all the power of Perl behind it. Mastering Perl/Tk is the...
Building .NET Applications for Mobile Devices
Building .NET Applications for Mobile Devices
Master mobile programming with this title! It demonstrates how to use the Microsoft .NET Framework and Visual Studio.Net to create applications for phones, Pocket PCs, and other portable devices. Focusing on ASP.NET and the .NET Mobile Web SDK, it shows how to deliver appropriately formatted content for diverse hand held clients from a single...
MySpace For Dummies (Computers)
MySpace For Dummies (Computers)
Activate the built-in tools to use MySpace safely

Trick out your profile, meet new people, and promote your talents on MySpace

MySpace is the place to connect with friends online and this book helps you make the most of it. Here's how to customize your profile so it stands out in a crowd,...

Smart Client Architecture and Design Guide (Patterns & Practices)
Smart Client Architecture and Design Guide (Patterns & Practices)
Get expert, pragmatic guidance on how to design and build smart client solutions that combine the benefits of traditional, rich-client applications with the manageability of thin clients. Software architects and developers will learn how to evaluate whether a smart client solution is appropriate for their client architecture, and get practical...
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy