|
|
|
|
eBay For Dummies (Computer/Tech)Buy low, sell high, and join the eBay community
Economy shopper or entrepreneur — discover the secrets to eBay success!
The bucks start here! Whether you're saving them or earning them, eBay's the place, and Marsha Collier is the person to show you how. Get... | | iPhone JavaScript Cookbook
Written in a cookbook style, this book offers solutions using a recipe-based approach. Each recipe contains step-by-step instructions followed by an analysis of what was done in each task and other useful information. The cookbook approach means you can dive into whatever recipes you want in no particular order. This book is for web... | | Windows Home Server Users Guide (Expert's Voice)If you’re searching for a practical and comprehensive guide to installing, configuring, and troubleshooting Microsofts Windows Home Server, look no further. Inside Windows Home Server User’s Guide, you’ll learn how to install, configure, and use Windows Home Server and understand how to connect to and manage different... |
|
| | Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary
form as early as the 1960’s, AR is only now becoming truly practical. Recent
advances in mobile processing, coupled with an explosion in digital storage capacity,
ubiquity of wireless broadband connections, mass adoption of smart phones, and... | | Building Java Enterprise Applications, Vol. 1: Architecture (O'Reilly Java)What are the key decisions and tradeoffs you face as you design and develop enterprise applications? How do you build the back end so that it not only handles your current needs but is flexible enough to allow your system to evolve as your needs expand? Answer these questions and many more with Building Java Enterprise Applications, an... |
|
|
How to Cheat at Securing a Wireless NetworkWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
- Denial of service (DoS) and other network layer attacks
- Unauthorized
... | | Dynamic HTML: The Definitive Reference (2nd Edition)I am going to admit a selfish motive for writing this book and, more recently, updating it to the second edition: I needed the finished product for my own consulting and development work. After struggling in the early Version 4 browser days with tangled online references and monstrous printed versions of Netscape, Microsoft, and World Wide Web... | | Oracle9i Administration and Management
With Oracle8 and Oracle8i, Oracle Corporation began a trend in database modernization
that has culminated in the Oracle9i release. Many consider Oracle9i to actually be
8.2; I would argue that with the multitude of new features, structures, and capabilities,
9i qualifies as a new release.
Oracle’s power... |
|
|
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 |