Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
Policy-Based Network Management (PBNM) systems enable business rules and procedures to be translated into policies that configure and control the network and its services. Those who manage network systems are aware that this approach can benefit both network management as well as the development of applications that use network services; however,...
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites

 

Photoshop compositing has really blown up over the last few years. You see composites everywhere from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop now and
...
Visual Media Coding and Transmission
Visual Media Coding and Transmission

This book presents the state-of-the-art in visual media coding and transmission

Visual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and...

Environmental Pollution and Control, Fourth Edition
Environmental Pollution and Control, Fourth Edition

Complex environmental problems are often reduced to an inappropriate level of simplicity. While this book does not seek to present a comprehensive scientific and technical coverage of all aspects of the subject matter, it makes the issues, ideas, and language of environmental engineering accessible and understandable to the nontechnical...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Magento Mobile How-To
Magento Mobile How-To

Create and configure your own Magento Mobile application and publish it for the Android and iOS platforms

Overview

  • Style and theme your Magento Mobile Application interface
  • Configure Product categories and add static content for mobile
  • Prepare and publish your Magento mobile...
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go
Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go

Use FileMaker® technologies to create powerful mobile data apps for iPhone®, iPod® touch, and iPad™

 

Apple’s FileMaker technologies make it easy to create powerful, data-driven apps for iPhone, iPod touch, iPad, and any mobile...

The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Second Edition
The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Second Edition
"If you need to know the IMS vision you need to read this book....

The IMS (IP Multimedia Subsystem) is the exciting new technology that will merge the Internet with the cellular world. It will make Internet technologies such as the web, email, instant messaging, presence, and...

Data Mining: A Knowledge Discovery Approach
Data Mining: A Knowledge Discovery Approach
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First, “long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second,...
unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy