co-operating
21XDA Developers'Android Hacker's Toolkit. The Complete Guide to Rooting, ROMs and Theming , Jason Tyler
Make your Android device truly your own Are you eager to make your Android device your own but you're not sure where to start? Then this is the book for you. XDA is the world's most popular resource… 2275.73 руб электронная книга22JUNOS OS For Dummies , Michael Bushong
Learn to use JUNOS to make your network reliable! Providing network administrators with a reliable network operating system, JUNOS software is an award-winning network operating system that focuses… 1950.53 руб электронная книга23Windows 7 Just the Steps For Dummies , Nancy Muir C.
Just the steps you need to get going with Windows 7! Coming in day and date with Microsoft's exciting release of the new Window 7 operating system, this friendly, accessible book shows you the… 1328.64 руб электронная книга24Near Field Communication (NFC). From Theory to Practice , Vedat Coskun
This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab– Istanbul research centre which conducts… 9884.31 руб электронная книга25Bridging Organization Design and Performance. Five Ways to Activate a Global Operation Model , Amy Kates
Five practical steps to enhance organization effectiveness on a global scale Bridging Organization Design and Performance is a handbook for leaders looking to enhance the success of their… 3243.24 руб электронная книга26Thermal Management of Electric Vehicle Battery Systems , Ibrahim Dincer
Thermal Management of Electric Vehicle Battery Systems provides a thorough examination of various conventional and cutting edge electric vehicle (EV) battery thermal management systems (including… 11582.49 руб электронная книга27A Guide to Kernel Exploitation: Attacking the Core , Enrico Perla, Massimiliano Oldani (2010)
"A Guide to Kernel Exploitation: Attacking the Core" discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different… 4531 руб28The Designer's Guide to the Cortex-M Processor Family: A Tutorial Approach , Martin Trevor (2013)
The Designer's Guide to the Cortex-M Family is a tutorial-based book giving the key concepts required to develop programs in C with a Cortex M- based processor. The book begins with an overview of… 5470 руб29Intelligent M&A. Navigating the Mergers and Acquisitions Minefield , Scott Moeller
Almost 70% of mergers fail, yet deals are essential for growing world-class companies. Therefore they must use all the tools and techniques at their disposal to improve their chances of success… 2601.58 руб электронная книга30OS X Yosemite For Dummies , Bob LeVitus
Get the most out of the latest version of OS X Updated and revised for the latest OS X release from Apple, OS X Yosemite For Dummies gives you fun, easy-to-understand coverage of the key features and… 1950.53 руб электронная книга