Home | Amazing | Today | Tags | Publishers | Years | Search 
Inferno Programming with Limbo
Inferno Programming with Limbo

Inferno Programming with Limbo is the first complete developer’s guide to programming for the Inferno operating system. Developed at Lucent's Bell Labs, Inferno enables cross-platform, portable, distributed application development that is well suited for networked applications on resource constrained, embedded systems. Limbo is its...

Softswitch : Architecture for VoIP (Professional Telecom)
Softswitch : Architecture for VoIP (Professional Telecom)
SOFTSWITCH DISSECTED

SOFT OR HARD? Hardware switches can cost tens of millions and occupy a city block in real estate. Softswitches are a fraction of the cost and the size of a refrigerator. Bypassing big iron can also make for a more efficient development environment, potentially offering more...

Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

Professional Microsoft Smartphone Programming
Professional Microsoft Smartphone Programming
"Professor Yang and Dr. Zheng are two of the passionate young researchers in the field with a lot of hands-on experience. Professor Ni, on the other hand, is a veteran in wireless technologies, 2.5G/3G cellular phones, and embedded systems. The energy, the hands-on experience, and the long-term vision ensure that the book is of highest...
Minimal Perl: For UNIX and Linux People
Minimal Perl: For UNIX and Linux People
No-nonsense and practical, yet with wit and charm. A joy to read."
-Dan Sanderson, Software Developer, Amazon.com

"Shows style, not just facts-valuable."
-Brian Downs, former Training Director, Lucent Technologies

"Brilliant, never tedious-highly recommended!"
-Jon Allen, Maintainer of
...

Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
The convergence of computing and communications has been predicted for many years. Today's explosion of a myriad of new types of personal computing and communications devices—notebook computers, personal digital assistants, "smart" phones, two-way pagers, digital cameras and so on—has resulted in new ways for people to...
Embedded Systems Firmware Demystified (With CD-ROM)
Embedded Systems Firmware Demystified (With CD-ROM)

Build embedded microprocessor-based systems from the ground up. Develop an integrated understanding of hardware and software issues by exploring the interaction of the firmware and hardware during the first critical few seconds after the microprocessor is powered up. By focusing on these crucial junctures, where software meets hardware, you...

Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games concisely draws together and illustrates the overlapping and interacting technical concerns of these sectors. The text explains the principles behind modern multiplayer communication systems and the techniques underlying contemporary networked games. The traffic patterns that modern games impose on networks, and...
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
Troubleshooting Windows 2000 TCP/IP
Troubleshooting Windows 2000 TCP/IP
W2Knews Electronic Newsletter, March 13, 2000
...guides for planning, testing and deploying a W2K TCP/IP network. A great troubleshooting help when you have connectivity problems.

TCP/IP is a set of protocols developed to allow computers to share resources across a network.
...
Learning Together Online: Research on Asynchronous Learning Networks
Learning Together Online: Research on Asynchronous Learning Networks
This book is about the past and future of research on the effectiveness of learning networks, a type of e-learning, online learning, Web-based learning, computer-supported collaborative learning, or virtual classroom (to use a number of common terms) in which students and teachers learn together online. The formal term is ...
Configuring ISA Server 2000
Configuring ISA Server 2000
Today's tools for connectivity are more sophisticated and flexible than ever. As a result, there are more variables involved in setting them up and making them all work together. Mission Critical ISA Server 2000 is designed to provide practical guidance to administrators at businesses that are going online. It teaches readers how to use the...
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy