|
|
Practical RF Handbook, Fourth Edition (EDN Series for Design Engineers)
Radio Frequency (RF) is the fundamental technology behind a huge range of modern consumer electronics and wireless communication devices, and this book provides a comprehensive and methodical guide to RF for engineers, technicians, enthusiasts and hobbyists with an interest in the electronics behind radio frequency communications.
... | | Java & XML Java and XML, 3rd Edition, shows you how to cut through all the hype about XML and put it to work. It teaches you how to use the APIs, tools, and tricks of XML to build real-world applications. The result is a new approach to managing information that touches everything from configuration... | | Backup & Recovery Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material. ... |
|
|
iText in Action: Creating and Manipulating PDFImagine a publisher who wants to "stamp" his ebooks on the fly with the name of the buyer (to discourage sharing). Such a publisher would (and we know one who does) use iText for the task. Developers looking to enhance web- and other applications with dynamic PDF document generation and/or manipulation will find this book unique in... | | Professional SQL Server 2005 Programming (Programmer to Programmer)Professional SQL Server 2005 Programming shows experienced developers how to master the substantially revamped feature set of the latest release of Microsoft SQL Server. The book begins with a concise overview of the new features of SQL Server that is of interest to experienced developers. This is especially important given the substantial... | | Embedded Java Security: Security for Mobile DevicesThis book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically... |
|
|
Result Page: Previous 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 Next |