|
|
|
|
Samsung Galaxy Tab 10.1 For Dummies
It’s not a cell phone. It’s not a computer. It’s the latest craze: the tablet. It
exists somewhere between the traditional computer and the newfangled
smart phone. That makes the tablet kind of an oddball, but quite a popular
oddball.
The Galaxy Tab is Samsung’s solution to your mobile, ... | | Designing a Wireless NetworkWireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to... | | Hacking Exposed Cisco NetworksImplement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised... |
|
|
Advanced Software Engineering: Expanding the Frontiers of Software TechnologyThis volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has... | | | | XHTML EssentialsWith Web access becoming available through TV, handheld devices, and even phones, developers need to create sites that can be viewed from different environments, not just from the desktop. Introducing XHTML, the next generation HTML, this practical guide jumpstarts Web developers on the technology that ensures that their Web pages stay true-to-form... |
|
Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... | | | | Collaborative Geographic Information SystemsMany advances in the integration of group spatial modeling, geographic information systems (GIS), and the Internet have occurred in recent years; however, there is a lack of materials to highlight the transdisciplinary characteristics and impacts of this convergence while providing a uniform and consistent treatment of this expanding field of... |
|
|
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 |