Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intel Galileo Networking Cookbook
Intel Galileo Networking Cookbook

Over 50 recipes that will help you use the Intel Galileo board to build exciting network-connected projects

About This Book

  • Create networking applications using the Intel Galileo board
  • Control your web-based projects in real time from anywhere in the world
  • Connect to the...
SAP HANA Cookbook
SAP HANA Cookbook

Your all-inclusive guide to understanding SAP HANA with practical recipes

Overview

  • Understand the architecture of SAP HANA, effectively transforming your business with the modeler and in-memory computing engine
  • Learn about Business Intelligence, Analytics, and Predictive analytics on top of...
Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Silverlight 1.0 Unleashed
Silverlight 1.0 Unleashed
Thank you for picking up Silverlight 1.0 Unleashed! Silverlight is changing the way many people think about designing and developing websites or web applications, and this book helps you take advantage of everything Silverlight enables. Silverlight makes it easier than ever to create rich web-based content or applications. And given that it’s...
High-performance and Hardware-aware Computing
High-performance and Hardware-aware Computing

High-performance system architectures are increasingly exploiting heterogeneity: multi- and manycore-based systems are complemented by coprocessors, accelerators, and reconfigurable units providing huge computational power. However, applications of scientific interest (e.g. in high-performance computing and numerical simulation) are not yet...

An Introduction to Parallel Programming
An Introduction to Parallel Programming

Parallel hardware has been ubiquitous for some time now. It’s difficult to find a laptop, desktop, or server that doesn’t use a multicore processor. Beowulf clusters are nearly as common today as high-powered workstations were during the 1990s, and cloud computing could make distributed-memory systems as accessible as...

Linux Mint Essentials
Linux Mint Essentials

A practical guide to Linux Mint for the novice to the professional

About This Book

  • Learn to use Linux Mint like a pro, starting with the installation and going all the way through maintaining your system
  • Covers everything you need to know in order to be productive, including browsing the...
Development and Performance Evaluation of an Adaptive MAC Protocol for MC-CDMA Wireless LANs with QoS Support
Development and Performance Evaluation of an Adaptive MAC Protocol for MC-CDMA Wireless LANs with QoS Support
Amobile adhoc network, is a system of autonomous mobile terminals connected by wireless links. Being independent of any infrastructure, these networks have the ability to be deployed easily, fast and cost efficient. The objective of this thesis is to exploit the advantages of the application of Code Division Multiple Access (CDMA) in the lower...
Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Object Technology: A Manager's Guide (2nd Edition)
Object Technology: A Manager's Guide (2nd Edition)
The first edition of Object Technology: A Manager's Guide is widely viewed as the classic introduction to this powerful computing concept. Object technology offers increased agility, significant time-to-market reduction, and the opportunity to exploit the potential of the World Wide Web by deploying globally distributed...
BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy