Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
With compelling insights and illuminating examples, the author reveals how Web sites, software applications, and mobile devices can be used to change people’s attitudes and behavior.

Can computers change what you think and do? Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army?

...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computingand communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such...
Introduction to Artificial Neural Systems
Introduction to Artificial Neural Systems
The recent resurgence of interest in neural networks has its roots in the recognition that the brain performs computations in a different manner than do conventional digital computers. Computers are extremely fast and precise at executing sequences of instructions that have been formulated for them. A human information processing system is composed...
Machine Translation: Its Scope and Limits
Machine Translation: Its Scope and Limits
Machine Translation (MT) is both an engineering technology and a measure of all things to do with languages and computers—whenever a new theory of language or linguistics is offered, an important criteria for its success is whether or not it will improve machine translation.

This book presents a history of machine translation (MT) from...

Ubiquitous Cardiology: Emerging Wireless Telemedical Applications (Premier Reference Source)
Ubiquitous Cardiology: Emerging Wireless Telemedical Applications (Premier Reference Source)
The Internet and other technological developments are now playing increasing roles in consumer health and the delivery of health services.

Ubiquitous Cardiology: Emerging Wireless Telemedical Applications provides developmental solutions and explanations for cardiovascular diagnostics. Useful to field researchers, academicians,...

Sams Teach Yourself iPad 2 in 10 Minutes (2nd Edition)
Sams Teach Yourself iPad 2 in 10 Minutes (2nd Edition)

The iPad 2 and the original iPad, taken together, are the biggest thing to hit computing in years. Drawing on the best of Apple’s iPhone and iPod touch products, and Apple’s Macintosh personal computers, while introducing a whole new way of seeing and interacting with information, the two new devices have grabbed the...

Computer Science with MATHEMATICA ®: Theory and Practice for Science, Mathematics, and Engineering
Computer Science with MATHEMATICA ®: Theory and Practice for Science, Mathematics, and Engineering

Computer algebra systems have revolutionized the use of computers within mathematics research, and are currently extending that revolution to the undergraduate mathematics curriculum. But the power of such systems goes beyond simple algebraic or numerical manipulation. In this practical resource Roman Maeder shows how computer-aided...

Nonprofit Essentials: Managing Technology
Nonprofit Essentials: Managing Technology

This book is intended to help nonprofit leaders become not only more effective as
administrators, marketers, researchers, and fundraisers, but also more responsible custodians
of limited funds.When every penny counts, computers can help to make it
possible for small, committed groups to perform the routine tasks that once...

unlimited object storage image
Result Page: 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy