Home | Amazing | Today | Tags | Publishers | Years | Search 
Packet Switching And X.25 Networks
Packet Switching And X.25 Networks
When computers started to become business tools and to assume an essential role in all companies, they were very large both physically and in terms of capital and revenue cost. Indeed, when erecting a new building the company would have to design features especially for the computer. A big room to house it, separate power supplies, large...
Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Legitimate Applications of Peer-to-Peer Networks
Legitimate Applications of Peer-to-Peer Networks
Peer-to-peer computing has gained a lot of prominence and publicity in the past years. Several start-up companies offer software packages that can be used for building peer-to-peer overlay networks for applications such as file sharing and music swapping. However, the legal and ethical questions associated with swapping copyrighted material on the...
Analog Circuits (World Class Designs)
Analog Circuits (World Class Designs)

Newnes has worked with Robert Pease, a leader in the field of analog design to select the very best design-specific material that we have to offer. The Newnes portfolio has always been know for its practical no nonsense approach and our design content is in keeping with that tradition. This material has been chosen based on its timeliness and...

Handbook of Information Management
Handbook of Information Management
I am very pleased to introduce this new edition of the Handbook. Formerly entitled Handbook of Special Librarianship and Information Work, this represents the eighth edition of what is generally regarded as Aslib’s ‘flagship’ reference work, the seminal text on modern information theories, procedures and practices since 1955....
Hybrid Methods in Pattern Recognition
Hybrid Methods in Pattern Recognition
The discipline of pattern recognition has seen enormous progress since its beginnings more than four decades ago. Over the years various approaches have emerged, based on statistical decision theory, structural matching and parsing, neural networks, fuzzy logic, artificial intelligence, evolutionary computing, and others. Obviously, these...
Theory and Practice of Relational Databases, Second Edition
Theory and Practice of Relational Databases, Second Edition
First published a decade ago, the Theory and Practice of Relational Databases gained fairly noticeable popularity, particularly amongst those readers to whom it was primarily addressed—the students. After a decade, however, any book needs reviewing, for the field will have developed, presentation could be improved, choice of topics might be...
Understanding Forensic Digital Imaging
Understanding Forensic Digital Imaging
The science of digital imaging can be divided into two separate branches: the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical...
E-Commerce Usability: Tools and Techniques to Perfect the On-Line Experience
E-Commerce Usability: Tools and Techniques to Perfect the On-Line Experience
We are all familiar with airport bookstall best sellers that promise fame, fortune and success in relationships. Many of them – at least the ones I have skimmed whilst waiting for one of the world’s favourite airlines – are deeply disappointing. Not because they do not work (to be honest I have not really been able to try them out...
Web Services in the Enterprise: Concepts, Standards, Solutions, and Management (Network and Systems Management)
Web Services in the Enterprise: Concepts, Standards, Solutions, and Management (Network and Systems Management)
The emergence of Web services is transforming traditional enterprises. However, the industry hype surrounding these technologies obscures the understanding of their impact and implications to enterprises.

Here the authors take the "big picture" perspective, offering a thorough understanding of the concepts behind Web service...

Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Sams Teach Yourself Samba in 24 Hours (2nd Edition)
    Sams Teach Yourself Samba in 24 Hours (2nd Edition)
    When Linux or Unix gets adopted by computing groups that already have users working with a version of the Windows platform, administrators overseeing the network integration of the two operating systems look to Samba to make a connection. Sams Teach Yourself Samba in 24 Hours furnishes 24 one-hour essential lessons geared toward...
    Result Page: 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy