Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless J2ME Platform Programming
Wireless J2ME Platform Programming

The authoritative tutorial for wireless J2ME application developers.

  • The essential tutorial for every J2ME platform developer: no wireless experience necessary
  • Complete coverage of architecture, design, coding, debugging, and deployment
  • Advanced topics include-persistent storage, networking,...
Richard Dawkins: How a Scientist Changed the Way We Think: Reflections by Scientists, Writers, and Philosophers
Richard Dawkins: How a Scientist Changed the Way We Think: Reflections by Scientists, Writers, and Philosophers
"A vivid picture of how one man, by force of rigorous analysis and clear writing, taught a generation of biologists how to think about evolution."--New York Times

ith the publication of the international bestseller The Selfish Gene some thirty years ago, Richard Dawkins powerfully captured a newly emerging way of
...
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Pro Android Apps Performance Optimization (Professional Apress)
Pro Android Apps Performance Optimization (Professional Apress)
Android quickly became almost ubiquitous. With the world transitioning from feature phones to smartphones, and then discovering that tablets are, after all, devices we can hardly live without, application developers today have a choice between mostly two platforms: Android and iOS. Android lowered, some may even say broke, the...
UML for Database Design
UML for Database Design

The Unified Modeling Language (UML), the standard graphical notation for modeling business and software application needs, has emerged as an effective modeling tool for database design. When used as a common modeling language for the many facets of system development, the UML can serve as a unifying framework that facilitates...

LinkedIn For Dummies (Computer/Tech)
LinkedIn For Dummies (Computer/Tech)
Once you're LinkedIn, you're part of the largest online network of professionals in the world! When you know how to make the most of your profile, manage your contacts, and handle invitations effectively, you'll go far. This book is packed with advice that will help you market yourself and find a job, an employee, an investor, or more business for...
RESTful Web APIs
RESTful Web APIs

The popularity of REST in recent years has led to tremendous growth in almost-RESTful APIs that don’t include many of the architecture’s benefits. With this practical guide, you’ll learn what it takes to design usable REST APIs that evolve over time. By focusing on solutions that cross a variety of domains, this...

Facebook For Dummies
Facebook For Dummies

The eagerly anticipated update to the bestselling first edition is here!

Facebook's popularity is seemingly unstoppable. The site experienced a huge boom in registered users in the latter half of 2008. It was at that time that Facebook also underwent a radical facelift and introduced numerous changes. Packed with hundreds of screen...

ASP.NET 3.5 Social Networking
ASP.NET 3.5 Social Networking
Social Networking is all about developing connections or ties between friends and associates. While people have always networked with one another the Internet has allowed us to network with people all over the world easily. Any interest or cause can support its own social network, where fans and followers can meet, chat, and share their views. But...
Testing of Genetically Modified Organisms in Foods
Testing of Genetically Modified Organisms in Foods

Examine several methods of testing for genetically modified organisms and the reasons behind their strict regulation!

Testing of Genetically Modified Organisms in Foods is the first study of the screening methods and tools utilized for determining the presence of genetically modified organisms (GMOs) in food products. Leading
...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy