|
|
|
|
Hacking del.icio.usI wrote this book with tinkerers in mind—that is to say, tinkerers of various levels of familiarity with del.icio.us in particular and Web development skill in general.Whether you’re just getting on your way to being a power user at del.icio.us, or whether you’re a hardcore Web development guru who’s running your own... | | Jess in Action: Java Rule-Based SystemsA practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and ... | | The IMS: IP Multimedia Concepts and ServicesThe IMS: IP Multimedia Concepts and Services, Second Editionbuilds on the success of the previous best-selling edition, providing comprehensive coverage of IMS – its concepts, architecture, protocols and functionalities with a wealth of new and updated material. Mobile telephony with the current technology has been hugely... |
|
Deploying Cisco Voice over IP SolutionsIf you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in... | | Beginning Game Development with Python and Pygame: From Novice to ProfessionalLike music and movies, video games are rapidly becoming an integral part of our lives. Over the years, you've yearned for every new gaming console, mastered each blockbuster within weeks after its release, and have even won a local gaming competition or two. But lately you've been spending a lot of time thinking about a game idea of your own, or... | | Inside Ole (Microsoft Programming Series)In writing this book, I assumed that readers are familiar with the Windows API (primarily the Win32 API) because OLE itself, unlike Win32, is not a technology for writing a complete application (although you could build one out of OLE components). I don't describe how to use Windows API functions, nor do I describe any of the intricate details of... |
|
Acoustic Diffusers and Absorbers: Theory, Design and ApplicationEvery book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed... | | Botnets: The Killer Web AppThis is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world... | | |
|
|
|
Result Page: 484 483 482 481 480 479 478 477 476 475 474 473 472 471 470 469 |