 |
|
 .NET Compact Framework 3.5 Data Driven Applications
Both the SQL Server Lite and Oracle Lite mobile databases are covered in detail, from data access to data synchronization. The book explains how device features such as Bluetooth, SMS, telephony, Infrared, and Windows Contacts can be accessed via .NET CF in a real-world example, namely the mobile sales-force application. It also explains.NET... |  |  Principles of Broadband Switching & Networks
The past few decades have seen the merging of many computer and communication applications. Enabled by the advancement of optical fiber, wireless communication, and very-large-scale integration (VLSI) technologies, modern telecommunication networks can be regarded as one of the most important inventions of the past century.
Before... |  |  VirtualBox 3.1: Beginner's Guide
The furore around virtualization is taking the technology world by storm and is a must for efficient utilization of network server capacity, storage administration, energy, and capital. VirtualBox is free which brings down your upfront costs for an agile data center. VirtualBox will transform your IT infrastructure into a lean data center on... |
|
 Wearable Monitoring Systems
As diverse as tomorrow’s society constituent groups may be, they will share the common requirements that their life should become safer and healthier, offering higher levels of effectiveness, communication and personal freedom. The key common part to all potential solutions fulfilling these requirements is wearable embedded systems,... |  |  Microsoft Windows Home Server 2011 Unleashed (3rd Edition)
Covers the newest version of WHS!
This is the most comprehensive, practical, and useful guide to the brand-new version of Windows Home Server 2011. Paul McFedries doesn’t just cover all facets of running Windows Home Server: He shows how to use it... |  |  Deploying Microsoft Forefront Threat Management Gateway 2010
When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,... |
|
|
|
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 |