|
|
|
|
| | The Linux Philosophy for SysAdmins: And Everyone Who Wants To Be One
Reveals and illustrates the awesome power and flexibility of the command line, and the design and usage philosophies that support those traits. This understanding of how to extract the most from the Linux command line can help you become a better SysAdmin. Understand why many things in the Linux and Unix worlds are done as... | | Mediating the Human Body: Technology, Communication, and FashionThe increasing integration of the human body with technology is a topic that has been attracting significant attention of late (for comprehensive reviews, see the works of Fortunati, 1995, 1998, and Maldonado, 1992, 1997, 1998; see also Brooks, 2002; Hayles, 1999; Katz, 2003; Kurzweil, 2000; Moravec, 1999). Scholars, social ... |
|
|
EJB CookbookAll but two recipes in this book are based on the EJB 2.0 specification. The recipes on creating EJB web service endpoints and the EJB timer service are based on the EJB 2.1 specification. In a few chapters, the book covers other technologies or frameworks where appropriate. In fact, this book makes use of XDoclet, log4j, Ant, and Cactus. For... | | | | |
|
Wireless Sensor Network DesignsWireless Sensors are small, cheap, low maintenance and will revolutionize wireless communications.
’Wireless sensor networks’ is a rapidly growing discipline with new technologies emerging, new applications being developed and standards being finalized. Sensors and actuators allow for entirely new kinds of... | | 2007 Microsoft Office System Inside OutLearn everything you need to know for working with the 2007 Microsoft Office system--from the inside out! This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds for using the 2007 release of Microsoft Office--all in concise, fast-answer format. Whether you are upgrading from Office 97 or Office 2003, you'll be... | | Information Security Management Handbook, Fifth Edition, Volume 3Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and... |
|
|
Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 |