Home | Amazing | Today | Tags | Publishers | Years | Search 
Consumer's Guide to Cell Phones & Wireless Service
Consumer's Guide to Cell Phones & Wireless Service
Choosing the right mobile phone and service plan can be overwhelming, particularly if you travel abroad - this truly international guide is ideal for the mobile executive Experts estimate that by 2005 there will be over 1.26 billion wireless phone users around the world. (Source: Cellular Telecommunications Industry Association). It's overwhelming...
Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
Programming Lego Mindstorms with Java (With CD-ROM)
Programming Lego Mindstorms with Java (With CD-ROM)
Soon after its release, the LEGO MINDSTORMS Robotics Invention System (RIS) quickly became popular not only with its initial intended audience of children aged 11 and up, but also within a community of adult LEGO robotics enthusiasts that developed and spread worldwide with significant help from the Internet. Before long, hackers had deciphered the...
.NET Mobile Web Developer's Guide
.NET Mobile Web Developer's Guide
The .NET Mobile Web Developer's Guide provides a solid foundation for developing mobile applications using Microsoft technologies. With a focus on using ASP.NET and the .NET Mobile Internet Toolkit, .NET Mobile Web Developer's Guide will give you the insight to use Microsoft technologies for developing mobile applications. This book will also show...
Building a Cisco Wireless LAN
Building a Cisco Wireless LAN
Wireless LAN (Wi-Fi) technology is significantly more complex than cordless telephony; loss, coverage, and bandwidth requirements are much more stringent and the proliferation of wireless LANs in corporate environments has resulted in interesting security challenges. IEEE 802.11-based products offered by Cisco Systems have quickly become one of the...
Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
Windows 2000 Active Directory
Windows 2000 Active Directory
Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. If you are a...
Ruby Developer's Guide
Ruby Developer's Guide
"Ruby Developer's Guide" discusses the role of Ruby in real-world applications, including the use of databases and XML, the coding of graphical user interfaces (GUIs) by means of different toolkits, communicating with other languages over SOAP/XML-RPC or sockets, and the programming of concurrent and distributed applications. Using...
Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs
Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs

This book is about building robots using Lego bricks and components. In the first section of the book (Part I) we will discuss why you might find an interest in robotics as a hobby, and why Lego is an ideal system to have a fast start and great results. If you're reading this book you probably own a Mindstorms set, so you already have an...

Hack Proofing Your Network (Second Edition)
Hack Proofing Your Network (Second Edition)
This book is intended to teach skills that will be useful for breaking into computers.
If that statement shocks you, then you probably aren’t familiar with the
legitimate reasons for hacking.These reasons can be security testing, consumer
advocacy and civil rights, military interests, and “hacktivist” politics;
...
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Journey to the Center of the Internet: Now Showing in 3-D (Book & CD)
Journey to the Center of the Internet: Now Showing in 3-D (Book & CD)
Jules Verne watch out! Now you can take a virtual tour to the centre of a computer network.

If you need to know the difference between a router and a bridge, or a WAN and a LAN, where do you start? Journey to the Center of the Network: Now Showing in 3D is a truely innovative book and CD package. It introduces the reader to the highly
...
Result Page: Previous 2984 2985 2986 2987 2988 2989 2990 2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003 3004 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy