Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Oracle APEX 4.0 Cookbook
Oracle APEX 4.0 Cookbook

Oracle Application Express 4.0 is a rapid web application development tool that works with the Oracle database. Using features like Plug-ins and Dynamic Actions, APEX helps you build applications with the latest techniques in AJAX and JavaScript.

The Oracle Application Express 4.0 Cookbook shows you recipes to develop and deploy...

Spatial Decision Support Systems: Principles and Practices
Spatial Decision Support Systems: Principles and Practices

Geographic information systems (GIS) have been under continuous development for several decades. By now, they are both well known and widely used, and have become integral elements of information technology applications in a wide variety of domains. In its simplest form, GIS software enables users to address a variety of questions...

Management 3.0: Leading Agile Developers, Developing Agile Leaders
Management 3.0: Leading Agile Developers, Developing Agile Leaders

I hate management books. I do. People give them to me all the time saying: “You should read this one, it changed my life!” These books are all about 150 pages. They have 14 point type, double-spaced. They have lots of pictures. They have titles like: Open Locker Management, Management by not Managing, First Clean All The...

HP Network Node Manager 9: Getting Started
HP Network Node Manager 9: Getting Started

This book guides you through the whole network monitoring implementation process. It covers all NNMi features and gives you hints to adapt this management software to your specific needs. It also describes how to use built-in features and adapt them in the most efficient way. It stitches the gap between technical personnel and management,...

Principles and Practice of Constraint Programming - CP 2006: 12th International Conference
Principles and Practice of Constraint Programming - CP 2006: 12th International Conference

The 12th International Conference on the Principles and Practice of Constraint Programming (CP 2006) was held in Nantes, France, September 24–29, 2006. Information about the conference can be found on theWeb at http://www.sciences. univ-nantes.fr/cp06/. Information about past conferences in the series can be found at...

ASP.NET MVC 2 Cookbook
ASP.NET MVC 2 Cookbook

Ten years ago, ASP.NET provided software developers with a means to write complex web applications with their existing Windows Forms skillsets. Today, it continues to be a robust framework for writing scalable applications, from small e-Commerce to enterprise-level CRM. But ten years later, with many business critical applications existing...

Hibernation (Greenwood Guides to the Animal World)
Hibernation (Greenwood Guides to the Animal World)

There are many examples of the amazing evolutionary adaptations in the animal kingdom that aid survival, but the ability of animals to hibernate is one of the most incredible. Most vertebrates must keep warm, because hypothermia or loss of body heat is potentially fatal, but some have evolved to withstand a massive drop in...

An Introduction to Parallel Programming
An Introduction to Parallel Programming

Parallel hardware has been ubiquitous for some time now. It’s difficult to find a laptop, desktop, or server that doesn’t use a multicore processor. Beowulf clusters are nearly as common today as high-powered workstations were during the 1990s, and cloud computing could make distributed-memory systems as accessible as...

Architecture of Network Systems (The Morgan Kaufmann Series in Computer Architecture and Design)
Architecture of Network Systems (The Morgan Kaufmann Series in Computer Architecture and Design)

Data communication networks are widely used today and are an integral part of our daily life. The Internet is a medium for business, personal, and government communication, and it is difficult to envision today’s society without this essential infrastructure. The continued success of the Internet is dependent on our ability to...

Smashing CSS: Professional Techniques for Modern Layout
Smashing CSS: Professional Techniques for Modern Layout

CSS has become so phenomenally successful—almost as successful as HTML itself—that it is sometimes hard to grasp. It’s everywhere now, from Web browsers to app stores to chat clients, and it doesn’t show any signs of fading away. As the language’s use continues to spread, its capabilities continue to advance.

...
Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)
Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)

One of the consequences of the information revolution is the ever-growing amount of
information we are surrounded with and the need to process this information
efficiently and extract meaningful knowledge. This phenomenon was termed “digital
obesity” or “information obesity” by Toshiba Ltd. One
...

Result Page: 434 433 432 431 430 429 428 427 426 425 424 423 422 421 420 419 418 417 416 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy