 |
|
 Mobile Commerce ApplicationsToday, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not... |  |  |  |  Absolute Beginner's Guide to Windows XP Media CenterUse the Absolute Beginner's Guide to Windows XP Media Center to take the PC experience further! This book helps you unlock the potential of your Windows XP Media Center, in the fun, friendly Absolute Beginner's Guide style. This book covers everything you need to know to use your Media Center to its full potential,... |
|
 |  |  The Handbook of Task Analysis for Human-Computer InteractionThe most widely cited reference on task analysis has been Task-Analysis for Human- Computer Interaction, edited by Dan Diaper, who must take the main blame for this new Handbook of Task Analysis for Human-Computer Interaction, as his motive was in part to stem the trickle of requests from around the world for chapters from the... |  |  BigNum Math: Implementing Cryptographic Multiple Precision ArithmeticThe origins of this book are part of an interesting period of my life. A period that saw me move from a shy and disorganized young adult, into a software developer who has toured various parts of the world, and met countless new friends and colleagues. It all began in December of 2001, nearly five years ago. I started a project... |
|
 Risk Management and Capital AdequacyA Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines
For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such... |  |  Internet Security: Cryptographic Principles, Algorithms and ProtocolsCryptography is the key to securing the Internet
If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important... |  |  The Art of JavaTake your programming expertise to the next level with help from Java programming all-stars Herb Schildt and James Holmes. Together they unlock the secrets that professional programmers use to create world-class software. Inside, Herb and James apply Java to a wide variety of high-powered applications, each demonstrating different features and... |
|
|
| Result Page: 1070 1069 1068 1067 1066 1065 1064 1063 1062 1061 1060 1059 1058 1057 1056 1055 1054 1053 1052 |