Home | Amazing | Today | Tags | Publishers | Years | Search 
Node Web Development
Node Web Development

Welcome to the world of developing web software using Node (also known as Node.js). Node is a newly-developed software platform that liberates JavaScript from the web browser, enabling it to be used as a general software development platform in server-side applications. It runs atop the ultra-fast JavaScript engine from the Chrome browser,...

Enterprise, Business-Process and Information Systems Modeling: 12th International Conference
Enterprise, Business-Process and Information Systems Modeling: 12th International Conference

This book contains the proceedings of two long-running events held in connection to the CAiSE conferences relating to the areas of enterprise, business-process and information systems modeling:

• The 12th International Conference on Business Process Modeling, Development and Support (BPMDS 2011) • The 16th...

BGP
BGP

This is a book about connecting to the Internet as reliably as possible. This means eliminating all single points of failure,including having just one Internet service provider (ISP). By multihoming to two or more ISPs,you can remain connected when either ISP (or your connection to them) experiences problems. However,there...

Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Essentials of Computer Architecture
Essentials of Computer Architecture

This book began when I was assigned to help salvage an undergraduate computer organization course. The course had suffered years of neglect: it had been taught by a series of professors, mostly visitors, who had little or no interest or background in digital hardware, and the curriculum had deteriorated to a potpourri of topics that...

The Templar Code For Dummies
The Templar Code For Dummies

A captivating look into the society of the Knights Templar

Brought to you by the author of Freemasons For Dummies, The Templar Code is more than an intriguing cipher or a mysterious symbol – it is the Code by which the Knights Templar lived and died, the Code that bound them together in secrecy, and the Code...

Getting Started with the Internet of Things: Connecting Sensors and Microcontrollers to the Cloud
Getting Started with the Internet of Things: Connecting Sensors and Microcontrollers to the Cloud

What is the Internet of Things? It's billions of embedded computers, sensors, and actuators all connected online. If you have basic programming skills, you can use these powerful little devices to create a variety of useful systems—such as a device that waters plants when the soil becomes dry. This hands-on guide...

Mobile Opportunistic Networks: Architectures, Protocols and Applications
Mobile Opportunistic Networks: Architectures, Protocols and Applications

The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark?

Featuring the contributions of prominent researchers from academia and industry,...

Configuring Cisco Unified Communications Manager and Unity Connection: A Step-by-Step Guide (2nd Edition)
Configuring Cisco Unified Communications Manager and Unity Connection: A Step-by-Step Guide (2nd Edition)

On March 10, 1876, Alexander Graham Bell made the first successful telephone call. As with many things, the test was purely accidental. Graham spilled acid on his leg, and Watson, his assistant, heard his call for help through the telephone. So, what has changed over the last 129 years? It would be easier to discuss what hasn’t...

Using Microsoft Access 2010
Using Microsoft Access 2010

This book is for anyone comfortable using a personal computer who needs to collect and manipulate information. Experience with Microsoft Access 2010 or an earlier version of Access is helpful, but not necessary. The book takes the user from the basic techniques on how to use Microsoft Access 2010 to a strong...

Neural Networks and Their Applications
Neural Networks and Their Applications

Neural Networks started as an academic discipline over 50 years ago with the publication by McCulloch and Pitts of their famous result that any logical problem can be solved by a suitable network composed of so-called binary decision nodes. These are processors which make the simplest possible decision, that is, whether or not to respond to a...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy