|
|
|
|
Maya Secrets of the ProsFeaturing completely original material from a new team of Maya know-it-alls, this second edition of an award-winning book is sure to inform and inspire even the most seasoned Maya user. In this distinctive Maya Press title, a cadre of professionals led by two acclaimed Maya pros, reveal the precious secrets they’ve... | | Broadband Bible, Desktop Edition
It’s better with broadband, and you can do it...
Whether you need Internet access to work from home, operate a home-based business, run a small business, or simply enjoy all the wonders of the Web, broadband is better. This guide makes it easy to choose among the many broadband options, get connected, set up... | | Firewalls 24sevenFor experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.
Written to... |
|
|
Concurrent and Real-Time Programming in AdaAda is the only ISO-standard, object-oriented, concurrent, real-time programming language. It is intended for use in large, long-lived applications where reliability and efficiency are essential, particularly real-time and embedded systems. In this book, Alan Burns and Andy Wellings give a thorough, self-contained account of how the Ada tasking... | | Programming ASP.NET AJAX: Build rich, Web 2.0-style UI with ASP.NET AJAXThe Wikipedia page for Ajax (http://en.wikipedia.org/wiki/Ajax) provides more than 40 meanings for the word, including the names of two characters in Homer’s Iliad (Ajax the Great and Ajax the Lesser), the name of an Amsterdam soccer team, a couple of automobiles, a horse, and—my personal favorite—a household cleaner made by... | | |
|
Exploring Scanning Probe Microscopy with MATHEMATICAThis second edition of the book Exploring Scanning Probe Microscopy with Mathematica is a revised and extended version of the first edition. It consists of a collection of self-contained, interactive, computational examples from the fields of scanning tunneling microscopy, scanning force microscopy, and related technologies, using Mathematica... | | Wireless SecurityGet full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless... | | |
|
|
Result Page: 652 651 650 649 648 647 646 645 644 643 642 641 640 639 638 637 636 635 634 |