Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using Samba, Second Edition
Using Samba, Second Edition
Using Samba, Second Edition is a comprehensive guide to Samba administration. This new edition covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores...
Programming Excel with VBA and .NET
Programming Excel with VBA and .NET

Why program Excel? For solving complex calculations and presenting results, Excel is amazingly complete with every imaginable feature already in place. But programming Excel isn't about adding new features as much as it's about combining existing features to solve particular problems. With a few modifications, you can transform...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Chemical Process Safety: Learning from Case Histories
Chemical Process Safety: Learning from Case Histories
"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising."
 - Gary Bennett,
...
Adobe Flex 2: Training from the Source
Adobe Flex 2: Training from the Source
Part of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus...
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
C++ Neural Networks and Fuzzy Logic
C++ Neural Networks and Fuzzy Logic

The number of models available in neural network literature is quite large. Very often the treatment is mathematical and complex. This book provides illustrative examples in C++ that the reader can use as a basis for further experimentation. A key to learning about neural networks to appreciate their inner workings is to experiment. Neural...

IP Multimedia Subsystem (IMS) Handbook
IP Multimedia Subsystem (IMS) Handbook
The IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use...
Mathematical Formulas for Economists
Mathematical Formulas for Economists

The present collection of formulas has been composed for students of economics or management science at universities, colleges and trade schools. It contains basic knowledge in mathematics, financial mathematics and statistics in a compact and clearly arranged form. This volume is meant to be a reference work to be used by students of...

RESTful Web Services Cookbook: Solutions for Improving Scalability and Simplicity
RESTful Web Services Cookbook: Solutions for Improving Scalability and Simplicity

While the REST design philosophy has captured the imagination of web and enterprise developers alike, using this approach to develop real web services is no picnic. This cookbook includes more than 100 recipes to help you take advantage of REST, HTTP, and the infrastructure of the Web. You'll learn ways to design RESTful web...

Excel PivotTables and PivotCharts: Your visual blueprint for creating dynamic spreadsheets
Excel PivotTables and PivotCharts: Your visual blueprint for creating dynamic spreadsheets

Master two of the most powerful features of Excel

Even if you use Excel all the time, you may not be up to speed on two of Excel's most useful features. PivotTable and PivotChart turn long lists of unreadable data into dynamic, easy-to-read tables and charts that highlight the information you need most; you can tweak...

Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

unlimited object storage image
Result Page: 462 461 460 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 444 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy