Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IPv6 Essentials
IPv6 Essentials
IPv6, the next generation Internet Protocol, has been in the works since the early 90s when the rapid growth of the Internet threatened to exhaust existing IP addresses. Drawing on 20 years--operational experience with the existing protocol (IPv4), the new protocol offers scalability, increased security features, real-time traffic support, and...
Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Now you can provide users with the same rich experience and functionality on the web that they've become accustomed to on the desktop computer. This book will show you how to take AJAX and Ruby on Rails to the next level by combining numerous cutting-edge technologies in order to develop full-fledged web applications. It explores a number of...
Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
Interconnection Noise in VLSI Circuits
Interconnection Noise in VLSI Circuits
Interconnections are a most important design issue nowadays. Trends in the microelectronic industry are leading to unwanted interconnect effects, especially noise, becoming more important. This increasing importance is mainly due to three reasons: increasing integration, increasing signal frequency spectrum components, and increasing complexity....
Architecting Software Intensive Systems: A Practitioners Guide
Architecting Software Intensive Systems: A Practitioners Guide
Today our civilization is highly dependent upon software-intensive systems. Software-intensive systems are those systems that are highly dependent upon computing infrastructure and software for the basic functionality they provide and the properties they possess. Architecture design of software-intensive systems as a separate and distinct...
Principles of Information Systems
Principles of Information Systems
As organizations continue to operate in an increasingly competitive and global marketplace, workers in all business areas including accounting, finance, human resources, marketing, operations management, and production must be well prepared to make significant contributions required for success. Regardless of your future role, you...
Voice and Speaking Skills For Dummies
Voice and Speaking Skills For Dummies

Find your voice, and communicate with confidence

Ever wondered why nobody hears you in meetings, or wished people would take you more seriously? Or maybe you're unhappy with your accent, or you feel insecure about your high-pitched or monotonous voice? Voice and Speaking Skills For Dummies will help you to...

Spring Roo in Action
Spring Roo in Action

Summary

Spring Roo in Action is a unique book that teaches you how to code Java in Roo, with a particular focus on Spring-based applications. Through hands-on examples, you'll learn how Roo creates well-formed application structures and supports best practices and tools. Plus, you'll get a...

FlexSim in Academe: Teaching and Research (EcoProduction)
FlexSim in Academe: Teaching and Research (EcoProduction)

This book describes a variety of teaching and academic research applications that effectively utilize FlexSim to: (1) provide guidelines, methods and tools for simulation modeling and analysis in a variety of educational settings and (2) address a variety of important design and operational issues in industry. Simulation is...

Object Technology: A Manager's Guide (2nd Edition)
Object Technology: A Manager's Guide (2nd Edition)
The first edition of Object Technology: A Manager's Guide is widely viewed as the classic introduction to this powerful computing concept. Object technology offers increased agility, significant time-to-market reduction, and the opportunity to exploit the potential of the World Wide Web by deploying globally distributed...
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect yourself from these information predators by securing your...
Information Retrieval: A Health and Biomedical Perspective (Health Informatics)
Information Retrieval: A Health and Biomedical Perspective (Health Informatics)

The third edition of this book will reach across disciplines and address the needs of not only those who study, evaluate, and purchase health information, but also computer and library/information scientists, information technology developers building databases, search engines, Web sites, and other systems for universities and hospitals who...

unlimited object storage image
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy