Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Transactional Memory (Synthesis Lectures on Computer Architecture)
Transactional Memory (Synthesis Lectures on Computer Architecture)
The advent of multicore processors has renewed interest in the idea of incorporating transactions into the programming model used to write parallel programs. This approach, known as transactional memory, offers an alternative, and hopefully better, way to coordinate concurrent threads. The ACI (atomicity, consistency, isolation) properties of...
Ontology-based Application Integration
Ontology-based Application Integration

There is probably no invention in the history of mankind that had such a profound impact on our lives in such a short time as the World Wide Web. Twenty years ago, Tim Berners-Lee has developed the first versions of HTML which allowed to weave documents into the large hypertext document that we know today. It was soon realized that...

MySQL for Python
MySQL for Python

Python is a dynamic programming language, which is completely enterprise ready, owing largely to the variety of support modules that are available to extend its capabilities. In order to build productive and feature-rich Python applications, we need to use MySQL for Python, a module that provides database support to our applications. Although...

Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Learning Python Testing
Learning Python Testing

A straightforward and easy approach to testing your Python projects

About This Book

  • Develop your knowledge and skills to increase your confidence in tackling new challenges
  • Guides you through the tools of automated testing in Python 3 with practical and real-life examples
  • ...
Code Design for Dependable Systems: Theory and Practical Applications
Code Design for Dependable Systems: Theory and Practical Applications
Theoretical and practical tools to master matrix code design strategy and technique

Error correcting and detecting codes are essential to improving system reliability and have popularly been applied to computer systems and communication systems. Coding theory has been studied mainly using the code generator...

Python 2.6 Graphics Cookbook
Python 2.6 Graphics Cookbook

Python 2.6 Graphics Cookbook is a collection of straightforward recipes and illustrative screenshots for creating and animating graphic objects using the Python language. This book makes the process of developing graphics interesting and entertaining by working in a graphic workspace, without the burden of mastering complicated language...

Deficit: Why Should I Care?
Deficit: Why Should I Care?

At the turn of this century, the American national debt stood at just under $6 trillion and the deficit at a "mere" $86 billion. Today, the national debt has topped $14 trillion, and the yearly deficit for 2011 is projected at a whopping $1.4 trillion.

According to the U.S. Treasury Department's Annual...

Work (The Art of Living Series)
Work (The Art of Living Series)

Work is one of the most universal features of human life; virtually everybody spends some part of their life at work. It is often associated with tedium and boredom; in conflict with the things we would otherwise love to do. Thinking of work primarily as a burden - an activity we would rather be without - is a thought that was shared by the...

Legal Knowledge and Information Systems:  JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
Legal Knowledge and Information Systems: JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
This volume contains the Proceedings of the Nineteenth JURIX Conference on Legal Knowledge and Information Systems (JURIX 2006), December 7th–9th, Université Pantheon Assas – Paris II, France. This year we hoped to put two new topics on the agenda: Artificial Intelligence in police and intelligence services and the impact of AI...
The Hundred-Year Lie: How to Protect Yourself from the Chemicals That Are Destroying Your Health
The Hundred-Year Lie: How to Protect Yourself from the Chemicals That Are Destroying Your Health

In a devastating exposé in the tradition of Silent Spring and Fast Food Nation, investigative journalist Randall Fitzgerald warns how thousands of man-made chemicals in our food, water, medicine, and environment are making humans the most polluted species on the planet. A century ago in 1906, when Congress enacted the...

unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy