Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android on x86: An Introduction to Optimizing for Intel® Architecture
Android on x86: An Introduction to Optimizing for Intel® Architecture

Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel’s x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and...

Practical Java Machine Learning: Projects with Google Cloud Platform and Amazon Web Services
Practical Java Machine Learning: Projects with Google Cloud Platform and Amazon Web Services
Build machine learning (ML) solutions for Java development. This book shows you that when designing ML apps, data is the key driver and must be considered throughout all phases of the project life cycle. Practical Java Machine Learning helps you understand the importance of data and how to organize it for use...
51 High-Tech Practical Jokes for the Evil Genius
51 High-Tech Practical Jokes for the Evil Genius
Give your friends and family the shock of their lives! 51 High-Tech Practical Jokes for the Evil Genius has everything you need to pull devastatingly funny (and safe!) technical pranks. From the “evasive beeping thing” to “rats in the walls” to the “rigged lie detector,” you’ll find a plethora of...
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in mobile computing and wireless communication. The focus of this lecture is on a systems approach...
Applications of Silicon-Germanium Heterostructure Devices (Series in Optics and Optoelectronics)
Applications of Silicon-Germanium Heterostructure Devices (Series in Optics and Optoelectronics)
The authors have certainly identified a gap in the literature … Overall, the book is very informative and provides a strong foundation for work in this active research area.
-K. Alan Shore, Optics and Photonics News

The most significant feature of this work is that it combines three distinct topics - technology, device
...
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance...

The Windows 2000 Device Driver Book, A Guide for Programmers, Second Edition
The Windows 2000 Device Driver Book, A Guide for Programmers, Second Edition

The #1 book on Windows driver development - totally updated for Windows 2000!

With The Windows 2000 Device Driver Book, any experienced Windows programmer can master driver development start to finish: planning, implementation, testing, debugging, installation, and distribution. Totally updated to reflect...

Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
As “techies,” we embrace the ability to understand the technology behind how
and why things work, to a point beyond most other people’s interest. Usually
what drives our interest is curiosity, a curiosity very similar to that which we
experienced in childhood.

Curiosity comes in different shapes and sizes
...
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Mobile Communications: An Introduction to New Media (Berg New Media Series)
Mobile Communications: An Introduction to New Media (Berg New Media Series)
The cellphone has achieved a global presence faster than any other form of information and communication technology. A global multi-billion dollar industry, this small, mundane device is now an intrinsic part of our everyday life.
 
This communications medium has had an immense social and cultural impact and...
FPGA Prototyping by VHDL Examples: Xilinx Spartan-3 Version
FPGA Prototyping by VHDL Examples: Xilinx Spartan-3 Version

HDL (hardware description language) and FPGA (field-programmable gate array) devices allow designers to quickly develop and simulate a sophisticated digital circuit, realize it on a prototyping device, and verify operation of the physical implementation. As these technologies mature, they have become mainstream practice. We can now use a PC...

Pro Android 3
Pro Android 3

Computing continues to become more and more personalized and accessible. Handheld devices have largely transformed into computing platforms. Mobile phones are no longer just for talking—they have been capable of carrying data and video for some time. Be it a phone or a tablet, the mobile device is now so capable of general-purpose...

unlimited object storage image
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy