|
|
|
|
A Splendid Exchange: How Trade Shaped the WorldA sweeping narrative history of world trade--from Mesopotamia in 3000 B.C. to the firestorm over globalization today--that brilliantly explores trade's colorful and contentious past and provides new insights into its future
Adam Smith wrote that man has an intrinsic "propensity to truck, barter, and exchange one thing for... | | Cyber Spying: Tracking Your Family's (Sometimes) Secret Online LivesUncover the Threats Lurking in the Darkness of Your Family's Computer
Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using... | | Cisco Security ArchitecturesCisco Security Architectures demystifies access lists, the PIX Firewall, and how to secure a Cisco based network.
In today's age of remote users and widespread Internet access, security continues to be of utmost importance to network administrators and engineers. This important, comprehensive guide shows you how to avoid common mistakes... |
|
Programming 8-bit PIC Microcontrollers in C: with Interactive Hardware SimulationEmbedded microcontrollers are everywhere today. In the average household you will find them far beyond the obvious places like cell phones, calculators, and MP3 players. Hardly any new appliance arrives in the home without at least one controller and, most likely, there will be several—one microcontroller for the user interface (buttons and... | | | | Java RulesDetailed yet accessible, Java™ Rules is a comprehensive reference for the application programmer who needs to master the intricacies of the Java™ programming language. Thoroughly describing the core of the Java programming language and the Java™ virtual machine (JVM™), Java™ Rules makes it... |
|
|
|
|
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 |