Home | Amazing | Today | Tags | Publishers | Years | Search 
Newton: A Very Short Introduction
Newton: A Very Short Introduction
This Very Short Introduction uses Newton's own unpublished writings to provide fascinating insight into the man who kept the Royal Society under his thumb, was Head of the Mint, and whose contributions to our understanding of the heavens and the earth are considered by many to be unparalleled. The author begins with the legends surrounding...
Business Process Management: Concepts, Languages, Architectures
Business Process Management: Concepts, Languages, Architectures
Business process management is usually treated from two different perspectives: business administration and computer science. While business administration professionals tend to consider information technology as a subordinate aspect for experts to handle, by contrast computer scientists often consider business goals and organizational regulations...
A+ Certification All-in-One Exam Guide, Sixth Edition
A+ Certification All-in-One Exam Guide, Sixth Edition
The Number-One CompTIA A+ Exam Guide

"The most comprehensive publication on the market." -Certification Magazine

Completely revised and updated for all four new exams and reviewed and approved by CompTIA, this definitive volume covers everything you need to know to pass the CompTIA A+...

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches (Signals and Communication Technology)
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches (Signals and Communication Technology)
Adaptive Nonlinear System Identification: The Volterra and Wiener Model Approaches introduces engineers and researchers to the field of nonlinear adaptive system identification. The book includes recent research results in the area of adaptive nonlinear system identification and presents simple, concise, easy-to-understand methods for...
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid...
Learning from Data Streams: Processing Techniques in Sensor Networks
Learning from Data Streams: Processing Techniques in Sensor Networks
Sensor networks consist of distributed autonomous devices that cooperatively monitor an environment. Sensors are equipped with capacities to store information in memory, process this information and communicate with their neighbors. Processing data streams generated from wireless sensor networks has raised new research challenges over the last few...
Practice of System and Network Administration, The (2nd Edition)
Practice of System and Network Administration, The (2nd Edition)
The first edition of The Practice of System and Network Administration introduced a generation of system and network administrators to a modern IT methodology. Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to...
Janitors, Street Vendors, and Activists: The Lives of Mexican Immigrants in Silicon Valley
Janitors, Street Vendors, and Activists: The Lives of Mexican Immigrants in Silicon Valley
"In a time when we have great need to understand Mexican immigrants and their place in U.S. society, Zlolniski offers a superior analysis of why and how advanced capitalist economies employ undocumented workers. After reading his book, we will never think again of immigration as something that exclusively comes from outside. The immigrants,...
Java All-In-One Desk Reference For Dummies (Computers)
Java All-In-One Desk Reference For Dummies (Computers)
9 books in 1—your key to success with Java!

Your one-stop guide to taming Java® and boosting your developer skills

Want to start programming with Java? This handy resource packs all the Java essentials you need into one easy-to-use guide. It's been fully updated for Java 6, covering...

A Chinese Bestiary : Strange Creatures from the Guideways Through Mountains and Seas
A Chinese Bestiary : Strange Creatures from the Guideways Through Mountains and Seas
A Chinese Bestiary presents a fascinating pageant of mythical creatures from a unique and enduring cosmography written in ancient China. The Guideways through Mountains and Seas, compiled between the fourth and first centuries b.c.e., contains descriptions of hundreds of fantastic denizens of mountains, rivers, islands, and seas,...
Result Page: 2339 2338 2337 2336 2335 2334 2333 2332 2331 2330 2329 2328 2327 2326 2325 2324 2323 2322 2321 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy