Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Telephony Demystified
Computer Telephony Demystified
Reshape your world with computer telephony

There’s no stopping the computer telephony (CT) revolution. Everywhere you look, CT is replacing the existing telephony infrastructure with products, systems, and solutions based on off-the-shelf computer technology.

If you’re ready to take advantage of customizable telephony...

Professional Rootkits (Programmer to Programmer)
Professional Rootkits (Programmer to Programmer)

Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for...

The Laughing Guide to a Better Life: Using Humor and Science to Improve Yourself, Your Relationships, and Your Surroundings
The Laughing Guide to a Better Life: Using Humor and Science to Improve Yourself, Your Relationships, and Your Surroundings
The motto of this book is smarter through laughter. If you can laugh about it, you can probably change it. The authors use a heavy dose of humor (the laughing side), and a healthy measure of science (the learning side) to help you improve yourself, your relationships, and your surroundings. The book introduces the “I CAN...
Saving Time and Money Using SAS
Saving Time and Money Using SAS
When selecting a technical book for myself I tend to choose one where there are lots of examples and sample code snippets that I can use and adapt for my own development projects. I wanted to write a book that I could use for reference myself, so I have tried to make sure there are code snippets wherever possible.

Instead of licensing
...
Paul Mijksenaar - Visual Foundation: an Introduction to Information Design
Paul Mijksenaar - Visual Foundation: an Introduction to Information Design
Matches are tricky to use in a car and a pocket lighter dangerous. Car manufacturers have consequently come up with a special car lighter. But in the film 'Mon Oncle' the driver hands this gadget to his passenger (played by Jacques Tati as Monsieur Hulot) as if it were a match. The designer had not foreseen that Monsieur...
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

Selenium 2 Testing Tools: Beginner's Guide
Selenium 2 Testing Tools: Beginner's Guide
Selenium WebDriver is the most used tool for browser automation. This book shows developers and testers how to create automated tests using a browser. You will learn how to be able to use Selenium IDE for quick throwaway tests. Or if you want to create tests to last, learn to use Selenium WebDriver.

You will learn to use
...
The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)
The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)

More than fifteen years ago, I was faced with the following problem in an assignment for a class in computer science. A brewery had to deliver beer to five stores, and the task was to write a computer program for determining the shortest route for the truck driver to visit all stores and return to the brewery. All my attemps to find a...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Linux Kernels Internals (2nd Edition)
Linux Kernels Internals (2nd Edition)

Since the introduction of Linix version 1.2 in March 1995, a worldwide community has evolved from programmers who were attracted by the reliability and flexibility of this completely free operating system. Now at version 2.0, Linux is no longer simply the operating system of choice for hackers, but is being successfully employed in commercial...

JDBC Metadata, MySQL, and Oracle Recipes: A Problem-Solution Approach (Expert's Voice in Java)
JDBC Metadata, MySQL, and Oracle Recipes: A Problem-Solution Approach (Expert's Voice in Java)
This book focuses on database metadata (data about data) or annotation-based code recipes
for JDBC API for use with Oracle and MySQL. The book provides complete and working solutions
for performing database metadata tasks using JDBC. You can cut and paste solutions
from this book to build your own database metadata applications. All
...
USB Design by Example: A Practical Guide to Building I/O Devices
USB Design by Example: A Practical Guide to Building I/O Devices
The Universal Serial Bus (USB) specification is a boon for users in that it makes the process of connecting peripherals to computers effortless, in most cases. As is often the case with user-friendliness, though, the cosmetic ease comes about as a result of behind-the-scenes complexity. USB Design by Example explains what USB means to...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy