Home | Amazing | Today | Tags | Publishers | Years | Search 
Broadband Packet Switching Technologies: A Practical Guide to ATM Switches and IP Routers
Broadband Packet Switching Technologies: A Practical Guide to ATM Switches and IP Routers
The effective design of high-speed, reliable switching systems is essential for moving the huge volumes of traffic and multimedia over modern communications networks. This book explains all the main packet-switching architectures, including all theoretical and practical topics relevant to the design and management of high-speed networks. Delivering...
VEE Pro: Practical Graphical Programming
VEE Pro: Practical Graphical Programming
With VEE 7.0 Trial Version on CD-ROM From the depths of the oceans to the deserts of Mars, VEE Pro is being used to collect data, provide automated testing and to construct remote command and telemetry interfaces. In more everyday environments, it can be found at the heart of manufacturing, process and quality control, and industrial data analysis...
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
An Introduction to Optimization, 2nd Edition
An Introduction to Optimization, 2nd Edition
A modern, up-to-date introduction to optimization theory and methods
This authoritative book serves as an introductory text to optimization at the senior undergraduate and beginning graduate levels. With consistently accessible and elementary treatment of all topics, An Introduction to Optimization, Second Edition helps students build a
...
BizTalk 2006 Recipes: A Problem-Solution Approach
BizTalk 2006 Recipes: A Problem-Solution Approach

BizTalk 2006 Recipes: A Problem-Solution Approach is based on the experiences of many of the most prominent experts in the field. It features over 170 problem-solving recipes for BizTalk developers and administrators.

BizTalk Server 2006 builds on the heritage and core architecture of BizTalk Server 2004, leading to a powerful...

Haskell: The Craft of Functional Programming (2nd Edition)
Haskell: The Craft of Functional Programming (2nd Edition)
The second edition of Haskell: The Craft of Functional Programming is essential reading for beginners to functional programming and newcomers to the Haskell programming language. The emphasis is on the process of crafting programs and the text contains many examples and running case studies, as well as advice an program design, testing, problem...
Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)
Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)

Whether building a console application, a web service, or a smart client, you eventually need to distribute your finished work. Deploying .NET Applications is a complete guide to delivering applications built with .NET. Packed with hands-on guidance, practical examples, and war stories from the authors' many experiences with deployment...

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Now you can provide users with the same rich experience and functionality on the web that they've become accustomed to on the desktop computer. This book will show you how to take AJAX and Ruby on Rails to the next level by combining numerous cutting-edge technologies in order to develop full-fledged web applications. It explores a number of...
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

The VLSI Handbook, Second Edition (Electrical Engineering Handbook)
The VLSI Handbook, Second Edition (Electrical Engineering Handbook)
We are most gratified to find that the first edition of The VLSI Handbook (2000) was well received and is widely used. Thus, we feel that our original goal of providing in-depth professional-level coverage of VLSI technology was, indeed, worthwhile. Seven years is a short time in terms of development of science and technology; however as this...
Secure Systems Development with UML
Secure Systems Development with UML
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML...

Result Page: 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy