Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Validated Designs for Object-oriented Systems
Validated Designs for Object-oriented Systems
Object-oriented design methods are commonplace in computing systems development, but are often dismissed as 'boxes & arrows'. If systems developers are to gain full advantage from such methods, they should be able to achieve designs that are not merely the subject of heated argument, but can be improved by careful, rigorous &...
Zend Enterprise PHP Patterns (Expert's Voice)
Zend Enterprise PHP Patterns (Expert's Voice)

Zend Enterprise PHP Patterns is the culmination of years of experience in the development of web-based applications designed to help enterprises big and small overcome the new challenges of the web-based application world and achieve harmony in not only the architecture of their application, but also the entire process under which that...

Engineering the Complex SOC: Fast, Flexible Design with Configurable Processors
Engineering the Complex SOC: Fast, Flexible Design with Configurable Processors

Engineering the Complex SOC The first unified hardware/software guide to processor-centric SOC design Processor-centric approaches enable SOC designers to complete far larger projects in far less time. Engineering the Complex SOCis a comprehensive, example-driven guide to creating designs with configurable, extensible processors. Drawing upon...

Pro Exchange Server 2013 Administration (Expert's Voice in Exchange)
Pro Exchange Server 2013 Administration (Expert's Voice in Exchange)

What you’ll learn

  • A comprehensive set of best practices for administering Exchange Server 2013 on a daily basis.
  • A thorough understanding of new features.
  • How to design and deploy new Exchange 2013 servers and upgrade existing Exchange servers to Exchange 2013.
  • Learn best...
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

Careers in Architecture
Careers in Architecture

Ideal for college students or anyone ready to go back to school, this series explores specific areas of interest and helps job seekers determine which job in that field suits them.

  • Breaks down specific educational requirements and additional training
  • Surveys the salaries and job opportunities to help seekers...
Low Energy Cooling for Sustainable Buildings
Low Energy Cooling for Sustainable Buildings
This long-awaited reference guide provides a complete overview of low energy cooling systems for buildings, covering a wide range of existing and emerging sustainable energy technologies in one comprehensive volume. An excellent data source on cooling performance, such as building loads or solar thermal chiller efficiencies, it is essential reading...
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Recent advancement and increased growth in Web technologies have resulted in an even greater need for more efficient scheduling and data transmission strategies. An increased reliance on wireless communications devices, with their constraint issues, has further complicated the problem. While both push and pull strategies provide certain solutions,...
IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Performance Evaluation and Benchmarking
Performance Evaluation and Benchmarking
It is a real pleasure and honor for us to present you this book titled
Performance Evaluation and Benchmarking. Performance evaluation and benchmarking
is at the heart of computer architecture research and development. Without
a deep understanding of benchmarks’ behavior on a microprocessor and
without efficient and
...
QoS for IP/MPLS Networks
QoS for IP/MPLS Networks

The comprehensive guide to implementing QoS in multiservice networks using IP/MPLS

  • Understand the technology components of implementing QoS in a multiservice network

  • Learn how to configure the MPLS QoS functionality in Cisco...

Engineering Wireless-Based Software Systems And Applications
Engineering Wireless-Based Software Systems And Applications
This comprehensive resource offers professionals detailed guidance on the engineering aspects of building software for wireless communications. From design and architecture to security and testing, the book shows how to overcome every engineering challenge encountered in successfully developing wireless software. Filled with open-source code...
unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy