Home | Amazing | Today | Tags | Publishers | Years | Search 
Extending and Embedding PHP
Extending and Embedding PHP
In just a few years PHP has rapidly evolved from a small niche language to a powerful web development tool. Now in use on over 14 million Web sites, PHP is more stable and extensible than ever. However, there is no documentation on how to extend PHP; developers seeking to build PHP extensions and increase the performance and functionality of their...
SCJP Exam for J2SE 5: A Concise and Comprehensive Study Guide for The Sun Certified Java Programmer Exam
SCJP Exam for J2SE 5: A Concise and Comprehensive Study Guide for The Sun Certified Java Programmer Exam
This book is primarily targeted at the Java programmers and students who want to prepare for the
SCJP certification exam for Java 5, CX-310-055, or the update exam, CX-310-056. Since the book has a
laser-sharp focus on the exam objectives, expert Java programmers who want to pass the exam can
use this book to ensure that they do not
...
System Architecture with XML
System Architecture with XML
"The whole world is talking XML, and the ramifications of its universal adoption are only beginning to surface. Whole business models will be affected by it; whole new business interests are being pursued because of it. The software industry itself will be rocked by it more than it cares to admit. This is so because XML brings us into the...
Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

Secrets of Podcasting, Second Edition: Audio Blogging for the Masses (2nd Edition)
Secrets of Podcasting, Second Edition: Audio Blogging for the Masses (2nd Edition)

Whether you want to create your own podcasts or just would like to locate and then listen to audio programs on your portable player, this is the book for you. In Secrets of Podcasting, Second Edition,author ...

WiMAX: Taking Wireless to the MAX
WiMAX: Taking Wireless to the MAX
With market value expected to reach $5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what...
Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

Digital Boudoir Photography: A Step-By-Step Guide to Creating Fabulous Images of Any Woman
Digital Boudoir Photography: A Step-By-Step Guide to Creating Fabulous Images of Any Woman
Boudoir photography does not require its subject to be a beautiful, physically flawless woman. It does not require the use of extravagantly expensive equipments, props, and studio space. In fact, the very essence of boudoir photography is the idea that its subject is not a professional model and is not even necessarily in the boudoir. No longer...
Materials for Engineering
Materials for Engineering
The criterion I have adopted for discussing a specific material in this book is its commercial availability, rather than its being confined to a research and development laboratory. In the ten years since the appearance of the first edition of the book, a number of such engineering materials have appeared on the market and a number of these will be...
Digital Signal and Image Processing Using MATLAB (ISTE)
Digital Signal and Image Processing Using MATLAB (ISTE)

Simulation is an essential tool in any field related to engineering techniques, whether it is used lor teaching purposes or in research and development. When teaching technical subjects, lab works play an important role, as im portant as exercise sessions in helping students assimilate theory. The recent introduction of simulation...

Adventure Guide to Thailand (Hunter Travel Guides)
Adventure Guide to Thailand (Hunter Travel Guides)

A thorough guide to the number-one tourist destination in Southeast Asia. The finest hotels, with impeccable service, cost a fraction of what you would pay elsewhere, and shoppers will never tire of the vast selections, from silk scarves and designer gowns to exotic jewellery. Try elephant trekking, sea canoeing or Thai massage. Taste the...

How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

Result Page: Previous 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy