Home | Amazing | Today | Tags | Publishers | Years | Search 
Migrating Applications to IPv6
Migrating Applications to IPv6

How badly will IPv6 break your application? What do you need to consider to make your application “IPv6-ready”? What questions should you ask?

In the ideal world, your application should “just work” on IPv6, just as it does on IPv4. However, in the real world, application issues crop up. These could be...

Literate Programming (Center for the Study of Language and Information - Lecture Notes)
Literate Programming (Center for the Study of Language and Information - Lecture Notes)

Computer programs arc fun to write, and well-written computer pro grams are fun to read. One of life's greatest pleasures can be the composition of a computer program that you know will be a pleasure for other people to read, and for yourself to read.

Computer programs can also do useful work. One of life's greatest...

Object-Oriented Design for Temporal GIS (Research Monographs in GIS)
Object-Oriented Design for Temporal GIS (Research Monographs in GIS)

A wide spectrum of research areas have contributed to the development of objectoriented analysis and design methods. Within computing sciences objectorientation has been developed in the fields of databases, programming languages, and system engineering. Some indications of this development include the proliferation of objectoriented...

Practical PC
Practical PC

At last, here is a book about the computers that people really use, with practical tips about how to use them. Practical PC provides a state-of-the-art introduction to Windows-based PCs, written in an easy-to-read style. In addition to the printed book, you receive a multimedia version of the entire textbook with videos and interactive...

Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Introduction to Embedded Systems: Interfacing to the Freescale 9S12

Embedded computer systems are electronic systems that include a microcomputer to perform specific dedicated tasks. The computer is hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer chips come pouring out of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...

Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Green IT in Practice
Green IT in Practice

There is a scientific consensus that we need to act rapidly to cut carbon dioxide emissions if we are to limit the most extreme effects of climate change. The IT sector is in a unique position to act as a catalyst for this change. By implementing simple efficiencies, the sector can reduce its carbon footprint – which currently...

Using Information Technology 9e Complete Edition
Using Information Technology 9e Complete Edition

The Williams, Using Information Technology, 9th edition utilizes a practical, applied approach to technology. This text is user-focused and has been highly updated including topics, pictures and examples. The Williams text contains less theory and more application to engage students who might be more familiar with technology. Continually...

Large-Scale Parallel Data Mining (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Large-Scale Parallel Data Mining (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

With the unprecedented rate at which data is being collected today in almost all elds of human endeavor, there is an emerging economic and scienti c need to extract useful information from it. For example, many companies already have data-warehouses in the terabyte range (e.g., FedEx, Walmart). The World Wide Web has an estimated 800...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

MATLAB: An Introduction with Applications
MATLAB: An Introduction with Applications

MATLAB is a powerful language for technical computing. The name MATLAB stands for MATrix LABoratory, because its basic data element is a matrix (array). MATLAB can be used for math computations, modeling and simulations, data analysis and processing, visualization and graphics, and algorithm development.

MATLAB is widely used...

Packet Guide to Routing and Switching
Packet Guide to Routing and Switching

For a long time, I was very happy building Ethernet networks, working with switches and then moving to 802.11. It took awhile, but eventually I realized that the world of interconnected networks cannot be reached with Layer 2 alone. In addition, as you spread your wings from the Layer 2 broadcast domains, you encounter the wonders of...

Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy