Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MacIntosh Technology in the Common Hardware Reference Platform
MacIntosh Technology in the Common Hardware Reference Platform
This book presents specifications and standards for the Apple Macintosh technology cited in the PowerPC Microprocessor Common Hardware Reference Platform (CHRP) specification.

The CHRP specification is a joint publication of Apple Computer, Inc., International Business Machines Corporation, and Motorola, Inc. It defines a common hardware
...
Quartz 2D Graphics for Mac OS X(R) Developers
Quartz 2D Graphics for Mac OS X(R) Developers
On Mac OS X, Macintosh developers depend on the graphics and imaging frameworks of the Core Graphics system to implement multimedia features in their applications. With Core Graphics Apple has answered the increasing demands of graphics developers with a powerful collection of tools, including Quartz 2D and Core Image. Quartz 2D is a modern drawing...
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Linux Applications on Pseries
Linux Applications on Pseries
The strengths of the AIX operating system are well known among in the UNIX software community. Its reliability and great degree of scaling make AIX the perfect choice for hosting mission-critical applications. It is a robust and flexible operating system that meets all the requirements for the various demands of e-business environments. At the same...
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Physics Modeling for Game Programmers
Physics Modeling for Game Programmers
Programmers who want to include 3D math and physics in a game have to wade through physics textbooks and dreary tomes on linear algebra and group theory, only to find that the material is too abstract to be used directly in their games. This book gives readers the skills they want and need to incorporate real physics into their games. As they work...
IP Multimedia Subsystem (IMS) Handbook
IP Multimedia Subsystem (IMS) Handbook
The IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use...
unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy