Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Javascript Programmer's Reference
Javascript Programmer's Reference
The book is aimed at people who already have some knowledge of JavaScript and need a companion volume to their daily work. It is primarily aimed at the experienced practitioner, and so does not attempt to be a tutorial for the beginner.

For a tutorial book, we suggest Paul Wilton's Beginning
...
Researching Learning in Virtual Worlds (Human-Computer Interaction Series)
Researching Learning in Virtual Worlds (Human-Computer Interaction Series)

Most of the chapters in this book are extended papers from Research Learning in Virtual Environments (reLIVE08), an international conference held by the UK Open University in Milton Keynes in November 2008. Authors of the best papers and presentations from the conferences were invited to contribute to Research Learning in Virtual Worlds, the...

App Savvy: Turning Ideas into iPad and iPhone Apps Customers Really Want
App Savvy: Turning Ideas into iPad and iPhone Apps Customers Really Want
How can you make your iPhone or iPad app stand out in the highly competitive App Store? While many books simply explore the technical aspects of iPhone and iPad app design and development, App Savvy focuses on the business, product, and marketing elements critical to pursuing, completing, and selling...
Quantum Wells, Wires and Dots: Theoretical and Computational Physics of Semiconductor Nanostructures
Quantum Wells, Wires and Dots: Theoretical and Computational Physics of Semiconductor Nanostructures
This book is aimed at providing all of the essential information, both theoretical and computational, in order that the reader can, starting from essentially nothing, understand how the electronic, optical and transport properties of semiconductor heterostructures are calculated. However, perhaps more importantly, starting from this low...
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
Routing, Flow, and Capacity Design in Communication and Computer Networks
Routing, Flow, and Capacity Design in Communication and Computer Networks
"Pioro and Medhis book is very refreshing and gives a comprehensive view of network design. It unifies many important topics on network design that are not found in one place; for example, this book provides the first thorough treatment of multi-layer design. Practitioners will find the book useful due to its development of both models and...
Multimedia Wireless Networks: Technologies, Standards and QoS
Multimedia Wireless Networks: Technologies, Standards and QoS
  • Integrating QoS in wireless multimedia network design
  • Delivering QoS in WLANs, WPANs, WMANs, cellular, and satellite networks
  • Covers every leading current and emerging wireless network standard

Integrate QoS into virtually any multimedia wireless network

From...

Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
Voice and Audio Compression for Wireless Communications
Voice and Audio Compression for Wireless Communications
"I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)

Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This
...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Working With Your Doctor: Getting the Healthcare You Deserve (Patient Centered Guides)
Working With Your Doctor: Getting the Healthcare You Deserve (Patient Centered Guides)

Getting the best healthcare in today's world requires that you participate in the process. Working with Your Doctor: Getting the Healthcare You Deserve will help you to be your own advocate, to get the very vest in healthcare, and to have the best possible relationship with your doctors. It will show you how to become an...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy