Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition)
UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition)
This book describes four different forms of IPC in detail:
  1. message passing (pipes, FIFOs, and message queues),
  2. synchronization (mutexes, condition variables, read-write locks, file and record locks, and semaphores),
  3. shared memory (anonymous and named), and
  4. remote...
CompTIA Security+ Study Guide
CompTIA Security+ Study Guide

Prepare for CompTIA's updated Security+ exam

Validate your professional computer security expertise with certification that helps you stand out in the marketplace. This guide is your key to preparing for CompTIA's new Security+ SY0-201 exam, the first major revision of the exam since it was launched in 2002. Acquire hands-on skills and...

Consumer Electronics Troubleshooting and Repair Handbook
Consumer Electronics Troubleshooting and Repair Handbook

* The ultimate troubleshooting and repair reference for professional technicians and hobbyists focuses on the most popular consumer electronic devices
* All major consumer electronics troubleshooting techniques--for the first time anywhere!
* Hundreds of illustrations clarifying effective troubleshooting and repair methods...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Hacking Video Game Consoles: Turn your old video game systems into awesome new portables (ExtremeTech)
Hacking Video Game Consoles: Turn your old video game systems into awesome new portables (ExtremeTech)
Space Invaders and Asteroids are back!

Loved that Atari® when you were a kid? So did Ben Heckendorn — so much, in fact, that he successfully resurrected it as a slim, go-anywhere portable. When Playstation® and Nintendo® aficionados got jealous, he created miniaturized, fully functioning, battery-powered versions of those too....

XNA Game Studio 4.0 Programming: Developing for Windows Phone 7 and Xbox 360 (Developer's Library)
XNA Game Studio 4.0 Programming: Developing for Windows Phone 7 and Xbox 360 (Developer's Library)

Get Started Fast with XNA Game Studio 4.0–and Build Great Games for Both Windows® Phone 7 and Xbox 360®

 

This is the industry’s best reference and tutorial for all aspects of XNA Game Studio 4.0 programming on all supported platforms,...

Learning Together Online: Research on Asynchronous Learning Networks
Learning Together Online: Research on Asynchronous Learning Networks
This book is about the past and future of research on the effectiveness of learning networks, a type of e-learning, online learning, Web-based learning, computer-supported collaborative learning, or virtual classroom (to use a number of common terms) in which students and teachers learn together online. The formal term is ...
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
Using Google™ Spreadsheets
Using Google™ Spreadsheets

Google Spreadsheets is the new web-based spreadsheet application that's giving Microsoft Excel a run for its money. With Google Spreadsheets, you can create complex spreadsheets online, using any web browser, complete with sophisticated formulas and functions. You can even share spreadsheets online and perform collaborative...

Fixed Mobile Convergence Handbook
Fixed Mobile Convergence Handbook

Requirements for next generation networks (NGNs) are fueling an architectural evolution. Service providers are obliged to give users access to content anytime, anyhow, anywhere, on any device. This requires a converged infrastructure in which users across multiple domains can be served through a single unified domain and all network services...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Access Hacks
Access Hacks
As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book. What it calls for is Access Hacks...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy