Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Samsung Galaxy Tab 10.1 For Dummies
Samsung Galaxy Tab 10.1 For Dummies

It’s not a cell phone. It’s not a computer. It’s the latest craze: the tablet. It

exists somewhere between the traditional computer and the newfangled smart phone. That makes the tablet kind of an oddball, but quite a popular oddball.

The Galaxy Tab is Samsung’s solution to your mobile,
...
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Advanced Java 2 Platform: How to Program (With CD-ROM)
Advanced Java 2 Platform: How to Program (With CD-ROM)
The authoritative DEITEL LIVE-CODE guide to programming with the Java 2 Enterprise (J2SE), Standard (J2SE) and Micro (J2ME) Editions

Java has revolutionized application and enterprise-systems...

Learning OMNeT++
Learning OMNeT++

Make realistic and insightful network simulations with OMNeT++

Overview

  • Create a virtual Network Simulation Environment rapidly
  • Focus less on the theory and more on results, with clear, step-by-step instructions, previews, and examples to help you along the way
  • Learn how to...
Cryptography for Dummies
Cryptography for Dummies

Protect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flame-throwing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes...

Advanced Software Engineering: Expanding the Frontiers of Software Technology
Advanced Software Engineering: Expanding the Frontiers of Software Technology
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft® Windows Server(TM) 2003 Network
MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft® Windows Server(TM) 2003 Network

Ace your preparation for the skills measured by MCP Exam 70-298—and on the job—with this official Microsoft study guide. Work at your own pace through a system of lessons, practice exercises, and design activities.

Maximize your performance on the exam by learning how to:

  • Document the impact of business and...
XHTML Essentials
XHTML Essentials
With Web access becoming available through TV, handheld devices, and even phones, developers need to create sites that can be viewed from different environments, not just from the desktop. Introducing XHTML, the next generation HTML, this practical guide jumpstarts Web developers on the technology that ensures that their Web pages stay true-to-form...
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Introduction to Ultra Wideband for Wireless Communications (Signals and Communication Technology)
Introduction to Ultra Wideband for Wireless Communications (Signals and Communication Technology)
Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB wireless channels, interference, signal...
Collaborative Geographic Information Systems
Collaborative Geographic Information Systems
Many advances in the integration of group spatial modeling, geographic information systems (GIS), and the Internet have occurred in recent years; however, there is a lack of materials to highlight the transdisciplinary characteristics and impacts of this convergence while providing a uniform and consistent treatment of this expanding field of...
unlimited object storage image
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy