Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises

After the mainframe and personal computer eras, the third major era in computer science, ubiquitous computing, describes the state of technology in which networked computers would surround every user.

Ubiquitous Computing Technology for Real Time Enterprises combines the fundamental methods, algorithms, and concepts of...

BEA Weblogic(R) Server Bible
BEA Weblogic(R) Server Bible
WebLogic Server is an industrial−strength application server developed and marketed by BEA Systems, Inc.
of San Jose, California. WebLogic is a pure−Java implementation of the Java 2 Platform, Enterprise Edition,
more commonly known as J2EE. J2EE represents Sun’s serious effort to make Java a powerful platform for...
Database Nation (Hardback)
Database Nation (Hardback)
Forget the common cold for a moment. Instead, consider the rise of "false data syndrome," a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like "data shadow" and "datasphere" in Database Nation, offering a...
Post-Silicon Validation and Debug
Post-Silicon Validation and Debug

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how...

Creating Facebook applications - 100 Success Secrets to creating Awesome Facebook Applications and leverage Social Media
Creating Facebook applications - 100 Success Secrets to creating Awesome Facebook Applications and leverage Social Media
Facebook is a very popular social networking site. There are millions of users who have joined this site for a good number of reasons: to stay in touch, create new relationships and interact with one another. The last reason is probably the most important reason of all – which is why so many Facebook application companies have decided to...
Forensic Pathology of Trauma (Forensic Science and Medicine)
Forensic Pathology of Trauma (Forensic Science and Medicine)
The practice of forensic pathology includes the collection and analysis of evidence in relation to a corpse in order to establish the cause of death. Knowledge of the cause of death contributes to the determination of the manner of death by medical examiners and coroners, who are occasionally assisted by law enforcement officers. In...
Introduction to Reversible Computing (Chapman & Hall/CRC Computational Science)
Introduction to Reversible Computing (Chapman & Hall/CRC Computational Science)

Few books comprehensively cover the software and programming aspects of reversible computing. Filling this gap, Introduction to Reversible Computing offers an expanded view of the field that includes the traditional energy-motivated hardware viewpoint as well as the emerging application-motivated software approach.

...

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
Advanced Memory Optimization Techniques for Low-Power Embedded Processors
Advanced Memory Optimization Techniques for Low-Power Embedded Processors
The design of embedded systems warrants a new perspective because of the following two reasons: Firstly, slow and energy inefficient memory hierarchies have already become the bottleneck of the embedded systems. It is documented in the literature as the memory wall problem. Secondly, the software running on the contemporary embedded devices is...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Corona SDK Mobile Game Development Beginners Guide - Second Edition
Corona SDK Mobile Game Development Beginners Guide - Second Edition

Learn, explore, and create commercially successful mobile games for iOS and Android

About This Book

  • From game physics to successful marketing, learn the fundamentals of Corona SDK for game development
  • Integrate your games with social networks such as Twitter and Facebook
  • ...
Next Generation Wireless Applications
Next Generation Wireless Applications
"There is no other book I've come across that offers this breadth of knowledge and makes you that excited about the possibilities in this fast paced market. Next Generation Wireless Applications is written in a very accessible way and packed full of useful insights from the author reflecting his extensive experience...
unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy