Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Fiber Optic Data Communication, Second Edition
Handbook of Fiber Optic Data Communication, Second Edition
The datacom industry is evolving very rapidly, and a host of new technologies, services, standards, and types of networks have been introduced since the first edition of the Handbook was published over 3 years ago. Building on the success of the first edition, this Handbook contains revisions and updates to all major chapters plus a new glossary...
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
The convergence of computing and communications has been predicted for many years. Today's explosion of a myriad of new types of personal computing and communications devices—notebook computers, personal digital assistants, "smart" phones, two-way pagers, digital cameras and so on—has resulted in new ways for people to...
Computer Telephony Demystified
Computer Telephony Demystified
Reshape your world with computer telephony

There’s no stopping the computer telephony (CT) revolution. Everywhere you look, CT is replacing the existing telephony infrastructure with products, systems, and solutions based on off-the-shelf computer technology.

If you’re ready to take advantage of customizable telephony...

Microsoft(r) SQL Server(tm) 2005 Developer's Guide
Microsoft(r) SQL Server(tm) 2005 Developer's Guide
CREATE ROBUST DATA MANAGEMENT AND BUSINESS INTELLIGENCE APPLICATIONS

Build powerful, enterprise-wide database programs using Microsoft SQL Server 2005 and the comprehensive information contained in this definitive volume. Microsoft SQL Server 2005 Developer's Guide explains how to develop server-side and client-side...

Photoshop CS2 Bible, Professional Edition
Photoshop CS2 Bible, Professional Edition
Inside, you'll find advanced coverage of Photoshop CS2
  • Explore new ways to adjust and enhance color
  • Use retouching and color adjustment techniques to correct seemingly impossible-to-fix images
  • Gain control over digital camera images with Photoshop's enhanced Camera Raw capabilities
  • Manage...
The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to...

Microsoft Visual C# .NET (Core Reference)
Microsoft Visual C# .NET (Core Reference)

When I first started working with Microsoft Visual C# .NET, I was immediately struck by how productive my coding sessions became. Even though I was working with the pre-Beta release, the development environment and the .NET Framework simplified much of the work that I was doing. The increased productivity was due to four...

Mastering Business Analysis with Crystal Reports 9 (Wordware Applications Library)
Mastering Business Analysis with Crystal Reports 9 (Wordware Applications Library)
This resource focuses on providing context and reference useful to mainstream business users, and explains how to apply Crystal Reports to your specialized database environment.

Database management systems allow businesses to organize and manage their operations effectively. However, it’s not always easy to view and understand data...

Solaris and LDAP Naming Services: Deploying LDAP in the Enterprise
Solaris and LDAP Naming Services: Deploying LDAP in the Enterprise
This book is one of an on-going series of books collectively known as the Sun
BluePrints™ program. The Solaris™ and LDAP Naming Services BluePrint describes
best practices for planning and deploying naming services based on the Lightweight
Directory Access Protocol (LDAP). The introduction of native LDAP in the Solaris
...
Advanced Visual Basic 6: Power Techniques for Everyday Programs
Advanced Visual Basic 6: Power Techniques for Everyday Programs
In Advanced Visual Basic 6, leading Visual Basic expert Matthew Curland demonstrates powerhouse techniques programmers can use to write high-performance, robust, and reusable VB code. Readers learn how to leverage the close relationships between VB, COM, and OLE Automation, extending the envelope of VB's capabilities and...
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Result Page: 703 702 701 700 699 698 697 696 695 694 693 692 691 690 689 688 687 686 685 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy