Flylib.com
↵
Assembly Language Programming
Computer Mathematics
AIX
C & C++ Windows Programming
Java I/O
File Viewer, Part 2
Byte Array Streams
The OutputStreamWriter Class
Identifying Ports
Files
Absolute Beginner[ap]s Guide to Project Management
Project Plan Checklist
Developing the Work Breakdown Structure
Best Practices
Powerful Quality Strategies
Special Situations
101 Microsoft Visual Basic .NET Applications
Interacting with the Operating System
Working with the .NET Framework
Advanced .NET Framework
Visual Studio .NET
Coding Conventions
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Metadata exchange
Service-orientation and object-orientation (Part II)
The bottom-up strategy
WS-Coordination overview
Appendix B. Service Models Reference
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 10. Control XMMS with Bluetooth
Hack 36. Estimate Network Performance
Hack 47. Securely Connect Two Networks
Hack 60. Backlight Your Zipit
Hack 83. Make a Deep Dish Cylindrical Parabolic Reflector
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies