Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft .NET Compact Framework (Core Reference)
Microsoft .NET Compact Framework (Core Reference)

There are two main factors driving increased usage of handheld devices in the enterprise. The first is the ever-decreasing cost of hardware. In the week that I write this, Dell is launching its first Pocket PC at a price that is intended to undercut rivals, Hewlett Packard has announced new low-end and high-end iPaqs, and...

Introduction to Extensible HTML (xHTML)
Introduction to Extensible HTML (xHTML)

This introductory book describes what is xHTML Basic, when to use it, and why it is important to learn. You will discover how the xHTML Basic language was developed and they types of applications that benefit from xHTML Basic programs.

The basic programming structure of xHTML Basic is describes along with the basic commands including...

Introduction To Data Networks, Pdn, Lan, Man, Wan, And Wireless Data, Technologies And Systems
Introduction To Data Networks, Pdn, Lan, Man, Wan, And Wireless Data, Technologies And Systems

This book explains the different types of data networks, how the key types of data networks operate, and the different types of data services they provide. Data networks have become a fundamental part of almost all communication networks. Data networks are telecommunications networks that are installed and operated for information exchange...

Security Warrior
Security Warrior

This book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will...

Inside Network Perimeter Security (2nd Edition)
Inside Network Perimeter Security (2nd Edition)
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip...
XML in Theory and Practice
XML in Theory and Practice

XML is a powerful cross-platform mark-up language which has been readily adopted as a standard in many spheres of web and software development. Real benefits include its ease of integration into existing systems, the simplicity of using it in object-oriented environments and its wide applicability. Chris Bates shows how to use XML in modern...

Core JavaServer Faces (Sun Microsystems Press Java Series)
Core JavaServer Faces (Sun Microsystems Press Java Series)

JavaServer Faces promises to bring rapid user-interface development to server-side Java. It allows developers to painlessly write server-side applications without worrying about the complexities of dealing with browsers and Web servers. It also automates low-level, boring details like control flow and moving code between web...

Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication...
Introduction to Private Land Mobile Radio (LMR): Dispatch, LTR, APCO, MPT1327, iDEN, and TETRA
Introduction to Private Land Mobile Radio (LMR): Dispatch, LTR, APCO, MPT1327, iDEN, and TETRA
This book explains the different types of private land mobile radio systems, their basic operations, and the services they can provide.

If you are involved or getting involved in land mobile radio technologies and services, this book is for you. This book covers the basics of private land mobile radio systems including traditional...

About Face 2.0: The Essentials of Interaction Design
About Face 2.0: The Essentials of Interaction Design
Interaction Design professionals are constantly seeking to ensure that software and software-enabled products are developed with the end-user's goals in mind to make them more powerful and enjoyable for people who use them. This text ensures it.

First published seven years ago-just before the World Wide Web exploded into dominance in the...

Developing Microsoft .NET Controls with Microsoft Visual Basic .NET
Developing Microsoft .NET Controls with Microsoft Visual Basic .NET

Every click on a menu item or a dialog box—every interaction with a control—shapes the user’s experience and satisfaction with your software. Learn how to maximize the usability and impact of your Visual Basic .NET-based solutions by using the powerful intrinsic controls in the .NET Framework right out of the box—or by...

Repairing and Upgrading Your PC
Repairing and Upgrading Your PC

Most computer users think that fiddling with the insides of their PC is taboo. They fear that by removing the screws that hold the case on, they're crossing into forbidden territory. And even for those who know they can open the box and fix or upgrade their PC, analysis paralysis often stops them in their tracks:
...

Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy