Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL

Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been encouraged by the reception the book has received. Practitioners from a wide variety of industries— health care, energy, environmental science, life sciences, national intelligence, and publishing, to name a few—have told...

Knowledge-Based Virtual Education: User-Centred Paradigms
Knowledge-Based Virtual Education: User-Centred Paradigms
Virtual learning plays an important role in providing academicians, educators and students alike, with advanced learning experiences. At the forefront of these current technologies are knowledge-based systems that assess the environment in which such learning will occur and are adaptive by nature to the individual needs of the user (Grossman et...
Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Node Cookbook
Node Cookbook
The principles of asynchronous event-driven programming are perfect for today's Web, where efficient real-time applications and scalability are at the forefront. Server-side JavaScript has been here since the nineties, but Node got it right. With a thriving community and interest from the Internet giants, it could be the PHP of tomorrow....
Color Appearance Models (The Wiley-IS &T Series in Imaging Science and Technology)
Color Appearance Models (The Wiley-IS &T Series in Imaging Science and Technology)
The law of proportion according to which the several colors are formed, even if a man knew he would be foolish in telling, for he could not give any necessary reason, nor indeed any tolerable or probable explanation of them.
Plato

Despite Plato’s warning, this book is about one of the major unresolved issues in the field of
...
Mastering Laravel
Mastering Laravel

Develop robust modern web-based software applications and RESTful APIs with Laravel, one of the hottest PHP frameworks

About This Book

  • Master the flashiest functionalities Laravel has to offer
  • Use PHPSpec to design testable software by specification to ensure quality code
  • ...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)

Approaches to the recovery of three-dimensional information on a biological object, which are often formulated or implemented initially in an intuitive way, are concisely described here based on physical models of the object and the image-formation process. Both three-dimensional electron microscopy and X-ray tomography can be captured in the...

Nuendo Power!
Nuendo Power!
Whether you are a musician, recording engineer, sound designer, video editor, or other type of
media author, certainly you have noticed that the demands of audio production in today’s multimedia
environment have increased dramatically. With the proliferation of surround sound systems in theaters,
homes, and specialized
...
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy