Home | Amazing | Today | Tags | Publishers | Years | Search 
PC World, April 2008: 50 Best Software Secrets
PC World, April 2008: 50 Best Software Secrets
Increase the muscularity of your PC's browser, productivity apps and multimedia programs with these 50 plus finds; The Best Bargain PCs: Bargain desktops and laptops put to the test; The Right Social Network for You: 17 social networks that promote friendships, career growth and shared interest; Reviews and Rankings: 50 and 52-Inch HDTVs : Tested...
The Art & Science of JavaScript
The Art & Science of JavaScript
We've assembled seven of the greatest minds in modern JavaScript to teach you the most inspirational techniques you'll ever use. From creating impressive mashups and stunning, dynamic graphics, to more subtle user-experience enhancements, you're about to be amazed by the true potential of this powerful language.

With an all star line-up of...

Simply Rails 2
Simply Rails 2
Want to learn all about Ruby on Rails 2.0, the web application framework that is inspiring developers around the world?

The second edition of this practical, hands on book will:

  • show you how to install Ruby on Rails on Windows, Mac, or Linux
  • walk you, step by step, through the development of a Web 2.0...
The Complete Idiot's Guide to Playing Guitar (2nd Edition)
The Complete Idiot's Guide to Playing Guitar (2nd Edition)
Learn to play the guitar using this quick and easy guide. Whether you dream of playing classical guitar, a B.B. King lick, or just the opening bars to "Stairway to Heaven," this book can get you there. This easy-to-use guide introduces the beginning guitarist to all styles of playing, from classical to jazz and pop. Using basic...
Windows Vista Ultimate Bible
Windows Vista Ultimate Bible

The ultimate book on the ultimate Vista for gamers and digital media buffs

If you're the ultimate gamer and multimedia fan, Windows Vista Ultimate and this information-packed book are for you. Want to launch games with a single click? Share files with your Xbox 360? Try out new audio and media tools?...

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
RF Measurements for Cellular Phones and Wireless Data Systems
RF Measurements for Cellular Phones and Wireless Data Systems
Consult RF Measurements for Cellular Phones and Wireless Data Systems, the only source for practical, real-world information on radio frequency (RF) measurements for cellular phones and wireless data systems. Find a review of basic RF principles and terminology, descriptions of RF measurement equipment, an explanation of the RF devices...
Computers Simplified
Computers Simplified

Are you new to computers? Does new technology make you nervous? Relax! You're holding in your hands the easiest guide ever to computers — a book that skips the long-winded explanations and shows you how things work. All you have to do is open the book, follow Chip, your friendly guide — and discover just how easy it is to get up to...

VMware ESX Essentials in the Virtual Data Center
VMware ESX Essentials in the Virtual Data Center
The VMware ESX server is vital to virtualization methods used to perform server consolidation, software development, test automation, legacy Windows migration, and more. Server virtualization can drastically cut business costs, and considering that there are few experts in the field, VMware ESX Essentials in the Virtual Data...
Verification of Computer Codes in Computational Science and Engineering
Verification of Computer Codes in Computational Science and Engineering
How can one be assured that computer codes that solve differential equations are correct? Standard practice using benchmark testing no longer provides full coverage because today's production codes solve more complex equations using more powerful algorithms. By verifying the order-of-accuracy of the numerical algorithm implemented in the code, one...
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Result Page: 653 652 651 650 649 648 647 646 645 644 643 642 641 640 639 638 637 636 635 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy