Home | Amazing | Today | Tags | Publishers | Years | Search 
Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Developer's Workshop to COM and ATL 3.0
Developer's Workshop to COM and ATL 3.0
Learn how to build sophisticated COM objects using C++ and IDL, as well as how ATL supplies support for several COM procedures.

Microsoft’s Component Object Model is one of the most important concepts in software development today. Developer’s Workshop to COM and ATL 3.0 provides an in-depth treatment of COM and shows...

Telecommunications Challenges In Developing Countries: Asymmetric Interconnection Charges For Rural Areas
Telecommunications Challenges In Developing Countries: Asymmetric Interconnection Charges For Rural Areas
Telecommunications Challenges in Developing Countries addresses an important aspect of interconnection—the settings of call termination charges. In rural telecommunications, network costs are known to be high. The traditional consensus has been that many rural areas cannot be connected without subsidies. This paper investigates the...
Text, Speech and Dialogue
Text, Speech and Dialogue

This book constitutes the refereed proceedings of the 7th International Conference on Text, Speech and Dialogue, TSD 2004, held in Brno, Czech Republic, in September 2004.

The 78 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 128 submissions. The papers present a wealth of...

Code Design for Dependable Systems: Theory and Practical Applications
Code Design for Dependable Systems: Theory and Practical Applications
Theoretical and practical tools to master matrix code design strategy and technique

Error correcting and detecting codes are essential to improving system reliability and have popularly been applied to computer systems and communication systems. Coding theory has been studied mainly using the code generator...

Build Your Own Database Driven Website Using PHP & MySQL
Build Your Own Database Driven Website Using PHP & MySQL
This book is aimed at intermediate and advanced Web designers looking to make the leap into server-side programming. You’ll be expected to be comfortable with simple HTML, as I’ll make use of it without much in the way of explanation. No knowledge of JavaScript is assumed or required, but if you do know JavaScript, you’ll find it...
Memory Architecture Exploration for Programmable Embedded Systems
Memory Architecture Exploration for Programmable Embedded Systems
Continuing advances in chip technology, such as the ability to place more
transistors on the same die (together with increased operating speeds) have
opened new opportunities in embedded applications, breaking new ground in
the domains of communication, multimedia, networking and entertainment.
New consumer products, together
...
Vector Games Math Processors (Wordware Game Math Library)
Vector Games Math Processors (Wordware Game Math Library)
Vector math processors have, up until recently, been in the domain of
the supercomputer, such as the Cray computers. Computers that have
recently joined this realm are the Apple Velocity Engine (AltiVec)
coprocessor of the PowerPC G4 in Macintosh and UNIX computers, as
well as IBM’s Power PC-based Gekko used in the
...
Grid Computing (On Demand Series)
Grid Computing (On Demand Series)
IBM Business On Demand Series: Your business blueprint for leveraging the grid computing revolution.

When you turn on the light, the power grid delivers exactly what you need, instantly. What if computers and networks could work that way? Now they can...and that will transform the way you do business. Grid Computing is about the "Business...

Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
    The purpose of this book is to illustrate the applicability of Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security technologies in building a secure enterprise infrastructure containing Java-based enterprise applications. With a pragmatic approach, the book explains why Java security...
Teach Yourself Algebra for Electronic Circuits
Teach Yourself Algebra for Electronic Circuits

The way to go for problem-solving skills and applications, TEACH YOURSELF ALGEBRA FOR ELECTRIC CIRCUITS is the self-tutoring guide that's just right for electronics.

* Math that goes beyond elementary algebra, without the burden of heavy-duty calculus you don't need
* All the tools for solving any problem in a single place--no
...

Advanced Lighting and Materials with Shaders
Advanced Lighting and Materials with Shaders
Programmable GPUs provide the processing horsepower necessary to render realistic graphics in real time, but this has put a new burden on graphics programmers. They now need to have an in-depth understanding of lights and surface propertiex before they can use the capablities of the GPU.

About the Author
...
Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy