Home | Amazing | Today | Tags | Publishers | Years | Search 
Sharing Expertise: Beyond Knowledge Management
Sharing Expertise: Beyond Knowledge Management
The field of knowledge management focuses on how organizations can most effectively store, manage, retrieve, and enlarge their intellectual properties. The repository view of knowledge management emphasizes the gathering, providing, and filtering of explicit knowledge. The information in a repository has the advantage of being easily transferable...
Beginning VB 2005 Databases: From Novice to Professional (Beginning: From Novice to Professional)
Beginning VB 2005 Databases: From Novice to Professional (Beginning: From Novice to Professional)
Beginning Visual Basic 2005 Databases teaches you everything you need to know about relational databases, SQL, and ADO.NET 2.0, giving you a sound start in developing console and Windows database applications. The book also includes chapters on the new SQL Server XML data type and the forthcoming LINQ enhancements to the next version of...
Reconfigurable Computing: Accelerating Computation with Field-Programmable Gate Arrays
Reconfigurable Computing: Accelerating Computation with Field-Programmable Gate Arrays
This volume is unique: the first comprehensive exposition of the exciting new field of Reconfigurable Computing with FPGAs. By mapping algorithms directly into programmable logic, FPGA accelerators offer and deliver 10X-100X performance increases over microprocessors for a large range of application domains. Reconfigurable computing is found in...
Advanced Methods for Knowledge Discovery from Complex Data
Advanced Methods for Knowledge Discovery from Complex Data
This book brings together research articles by active practitioners and leading researchers reporting recent advances in the field of knowledge discovery. An overview of the field, looking at the issues and challenges involved is followed by coverage of recent trends in data mining. This provides the context for the subsequent chapters on methods...
Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software visualization encompasses the development and evaluation of methods for graphically representing different aspects of software, including its structure, its execution, and its evolution. Software visualization combines techniques from areas like software engineering, programming languages, data mining, computer graphics, information...
Computer Design and Architecture Revised and Expanded
Computer Design and Architecture Revised and Expanded
This unique and proven text provides a hands-on introduction to the design of a computer system-depicting, step by step, the arrangement of a simple but complete hypothetical computer followed by detailed architectural features of existing computer systems as enhancements to the structure of the simple computer. Changes in the Third Edition of...
Image Analysis, Random Fields and Dynamic Monte Carlo Methods: A Mathematical Introduction (Applications of Mathematics, 27)
Image Analysis, Random Fields and Dynamic Monte Carlo Methods: A Mathematical Introduction (Applications of Mathematics, 27)
This second edition of G. Winkler's successful book on random field approaches to image analysis, related Markov Chain Monte Carlo methods, and statistical inference with emphasis on Bayesian image analysis concentrates more on general principles and models and less on details of concrete applications. Addressed to students and scientists from...
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
Operating System Concepts
Operating System Concepts
Another defining moment in the evolution of operating systems

Small footprint operating systems, such as those driving the handheld devices that the baby dinosaurs are using on the cover, are just one of the cutting-edge applications you’ll find in Silberschatz, Galvin, and Gagne’s Operating System Concepts,...

C#: Your Visual Blueprint for Building .Net Applications (With CD-ROM)
C#: Your Visual Blueprint for Building .Net Applications (With CD-ROM)
Each step in this book is displayed with callouts to help you see exactly where the action takes place on the screen. This book covers over 100 tasks, including using attributes, operators, and classes; documenting code with XML, using arrays, building forms, programming Web services, using Windows designers and macros, troubleshooting, and...
Result Page: 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy