Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CCIE Security Practice Labs (CCIE Self-Study)
CCIE Security Practice Labs (CCIE Self-Study)

The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,...

Windows XP Annoyances for Geeks, 2nd Edition
Windows XP Annoyances for Geeks, 2nd Edition
Offering dozens of on-target tips, workarounds, and warnings, Windows XP Annoyances for Geeks allows users to improve their overall experience with the popular XP operating system. And now, with this updated edition, users can also expect detailed coverage of the newly released Service Pack 2 (SP2) technology, which provides protection against...
The Inmates Are Running the Asylum : Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
The Inmates Are Running the Asylum : Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
The Inmates are Running the Asylum argues that, despite appearances, business executives are simply not the ones in control of the high-tech industry. They have inadvertently put programmers and engineers in charge, leading to products and processes that waste huge amounts of money, squander customer loyalty, and erode competitive advantage. They...
HTML & XHTML : The Definitive Guide
HTML & XHTML : The Definitive Guide

HTML is changing so fast it's almost impossible to keep up with developments. XHTML is HTML 4.0 rewritten in XML; it provides the precision of XML while retaining the flexibility of HTML. HTML & XHTML: The Definitive Guide, 4th Edition, brings it all together. It's the most comprehensive book available on HTML and XHTML...

Design and Performance of 3G Wireless Networks and Wireless LANs
Design and Performance of 3G Wireless Networks and Wireless LANs
Cellular phones, especially those enabled by second-generation
telecommunication systems, have had tremendous impacts on our daily lives.
In some countries such as India, the number of cellular phone subscribers
has far exceeded the number of wired phone subscribers. Meanwhile, the
Internet has also significantly changed our
...
Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Game Developer's Market Guide (Game Development)
Game Developer's Market Guide (Game Development)
This book is for everyone involved in game development and for those who
want to break into the industry.
Calling someone a “game developer” covers a lot of territory. A developer might be
an artist making 3D models; a producer handling external development; a level
designer or composer; a programmer or writer. The
...
3ds max 4 Bible
3ds max 4 Bible
If 3ds max 4 can do it, you can do it, too … Take 3ds max 4 to the max — and join the ranks of the pros who've created animations for some of today's hottest games, movies, and TV shows. Packed with expert advice, time-saving tips, and more than 150 step-by-step tutorials, this all-in-one guide gets you up to speed quickly on the...
Building Parsers With Java
Building Parsers With Java
Parser building is a powerful programming technique that opens a world of opportunity for designing how users interact with applications. By creating mini-languages, you can precisely address the requirements of your application development domain. Writing your own parsers empowers you to access a database more effectively than SQL to efficiently...
Ultra-Wideband Wireless Communications and Networks
Ultra-Wideband Wireless Communications and Networks
Ultra-wideband (UWB) technology has great potential for applications in wireless communications, radar and location. It has many benefits due to its ultra-wideband nature, which include high data rate, less path loss and better immunity to multipath propagation, availability of low-cost transceivers, low transmit power and low interference. Despite...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

LDAP Programming, Management, and Integration
LDAP Programming, Management, and Integration
Focusing on the practical application of the Lightweight Directory Access Protocol, this tutorial is geared toward IS professionals and software developers who are responsible for getting the maximum potential from their directories by integrating them with existing processes and applications. As the Internet standard for directory services, LDAP...
unlimited object storage image
Result Page: 733 732 731 730 729 728 727 726 725 724 723 722 721 720 719 718 717 716 715 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy