There are two main factors driving increased usage of handheld devices in the enterprise. The first is the ever-decreasing cost of hardware. In the week that I write this, Dell is launching its first Pocket PC at a price that is intended to undercut rivals, Hewlett Packard has announced new low-end and high-end iPaqs, and...
This introductory book describes what is xHTML Basic, when to use it, and why it is important to learn. You will discover how the xHTML Basic language was developed and they types of applications that benefit from xHTML Basic programs.
The basic programming structure of xHTML Basic is describes along with the basic commands including...
This book explains the different types of data networks, how the key types of data networks operate, and the different types of data services they provide. Data networks have become a fundamental part of almost all communication networks. Data networks are telecommunications networks that are installed and operated for information exchange...
This book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will...
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip...
XML is a powerful cross-platform mark-up language which has been readily adopted as a standard in many spheres of web and software development. Real benefits include its ease of integration into existing systems, the simplicity of using it in object-oriented environments and its wide applicability. Chris Bates shows how to use XML in modern...
JavaServer Faces promises to bring rapid user-interface development to server-side Java. It allows developers to painlessly write server-side applications without worrying about the complexities of dealing with browsers and Web servers. It also automates low-level, boring details like control flow and moving code between web...
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication...
This book explains the different types of private land mobile radio systems, their basic operations, and the services they can provide.
If you are involved or getting involved in land mobile radio technologies and services, this book is for you. This book covers the basics of private land mobile radio systems including traditional...
Interaction Design professionals are constantly seeking to ensure that software and software-enabled products are developed with the end-user's goals in mind to make them more powerful and enjoyable for people who use them. This text ensures it.
First published seven years ago-just before the World Wide Web exploded into dominance in the...
Every click on a menu item or a dialog box—every interaction with a control—shapes the user’s experience and satisfaction with your software. Learn how to maximize the usability and impact of your Visual Basic .NET-based solutions by using the powerful intrinsic controls in the .NET Framework right out of the box—or by...
Most computer users think that fiddling with the insides of their PC is taboo. They fear that by removing the screws that hold the case on, they're crossing into forbidden territory. And even for those who know they can open the box and fix or upgrade their PC, analysis paralysis often stops them in their tracks: