The Unauthorized Guide to Pocket PC

The Unauthorized Guide to Pocket PC
ISBN-10
0789724723
ISBN-13
9780789724724
Category
Pocket computers
Pages
414
Language
English
Published
2000-11
Publisher
Que Pub
Author
Michael Morrison

Description

The Unauthorized Guide to Pocket PC is the best place to start for someone seriously considering the purchase of a Pocket PC, or someone who has just made the purchase and is eager to hit the ground running and use it to its full potential. Along with exploring the major software components of the Pocket PC platform, the book also guides the reader through other aspects of using a Pocket PC such as establishing an online connection and taking advantage of wireless communications. This book is for anyone who wants to learn how to get the most out of their Pocket PC, even beginners. No matter what model the reader has, this book will be a useful reference and learning tool.

Similar books

  • Special Edition Using Pocket PC 2002
    By Michael Morrison

    Special Edition Using Pocket PCs focuses on getting things done with Pocket PCs in a wireless networked environment. Coverage includes: security, synchronization, productivity using Pocket Word and Pocket Excel, multimedia...

  • Treo Essentials
    By Michael Morrison

    You already know the basics and this book will take you beyond them. You'll learn how to synchronize with a PC, launch applications while making a phone call, and take and share pictures.

  • Entrepreneurship, Innovation, and Platforms
    By Scott Stern, Annabelle Gawer, Jeffrey Furman

    How architecture wins technology wars. Harvard Business Review, 71(2), 86À96. Morrison, M. (2001). Pocket PC: The Unauthorized Guide. Indianapolis, Indiana, Que. Murray, J. (1998). Inside Windows CE. Redmond, WA, Microsoft Press.

  • Sams Teach Yourself XML in 24 Hours
    By Michael Morrison

    This manual shows what can be done with XML, while also teaching where the technology is headed. It includes topics like displaying XML files in HTML files, performing queries in XSL and building an online store.

  • Flash: The Future
    By Jon Warren Lentz, Bill Turner, Ian Chia

    Know Your Code We've discussed the importance of understanding your target device and target audience , and we've looked at some basic game design principles and how they will affect your game's code . We'll turn now to the logic and ...

  • The Vest Pocket Guide to Information Technology
    By Jae K. Shim, Joel G. Siegel

    It also provides for customer data analysis and supports e-commerce storefronts. cyber investing investing through telecommunications, such as online trading on the Internet. cyberspace originally used in Neuromrmcer, William Gibson's ...

  • Java 2 In Plain English
    By Michael Morrison, Brian Overland

    Java 2 In Plain English cuts to the core of Java 2 by delivering both a detailed reference section covering key components of the Java language, and a dense tutorial...

  • Pocket PC, Handheld PC Developer's Guide with Microsoft EMbedded Visual Basic
    By Nick Grattan

    ... unauthorized transfer of the software shall result in the immediate termination of this Agreement . 6 . TERMINATION : This license is effective until terminated . This license will terminate automatically without notice from the Company ...

  • The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide
    By William Gamble

    ... computers, smart phones, and tablets). 3.1.13 Employ cryptographic mechanisms to protect the confidentiality of remote ... the unauthorized disclosure of CUI. access 3.1.15 Authorize remote execution of privileged commands and remote ...

  • The iPod & iTunes Pocket Guide
    By Christopher Breen

    Here is your essential companion to the iPod touch, classic, nano, and shuffle, and the iTunes application.