Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C# Precisely
C# Precisely
This book describes the programming language C# (pronounced “c sharp”), version 2.0. It is a quick reference for the reader who has already learnt or is learning C# from a standard textbook and who wants to know the language in more detail. It should be particularly useful for readers who know the Java programming language and who want...
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Essential Law for Marketers
Essential Law for Marketers

'Essential Law for Marketers' offers clear and concise explanations of the laws that impact on the practice of marketing, advertising, sponsorship, design and public relations, providing expert guidance on crucial issues for the busy practitioner.

Each chapter in the book offers, in simple English,
...

Performance Metrics for Haptic Interfaces (Springer Series on Touch and Haptic Systems)
Performance Metrics for Haptic Interfaces (Springer Series on Touch and Haptic Systems)

Haptics technology is being used more and more in different applications, such as in computer games for increased immersion, in surgical simulators to create a realistic environment for training of surgeons, in surgical robotics due to safety issues and in mobile phones to provide feedback from user action. The existence of these applications...

Linux Networking-Howto
Linux Networking-Howto
The Linux Networking-HOWTO details important networking issues when using the popular Linux operating system. Linux Networking-HOWTO includes:

* informative background material for newcomers
* a generic discussion of networking issues
* technology-specific information grouped in three main sections: Ethernet and IP-related
...

Windows 2000 Commands Pocket Reference
Windows 2000 Commands Pocket Reference
This desktop reference documents Windows 2000 command mode. It is designed for system administrators, but will also prove beneficial to many other types of users. It includes most available Windows 2000 commands, as well as the most useful system administration command-line utilities from the Resource Kit (space permitting). Resource Kit commands...
ITIL Service Transition 2011 Edition (Best Management Practices)
ITIL Service Transition 2011 Edition (Best Management Practices)

The ITIL Editions 2011 has been updated for clarity, consistency, correctness and completeness. By focusing on delivery and control process activities, ITIL Service Operation describes how a highly desirable steady state of managing services can be achieved on a day-to-day basis. Key Features The updated ITIL publications share a similar...

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
HP-UX 11i Internals (Hewlett-Packard Professional Books)
HP-UX 11i Internals (Hewlett-Packard Professional Books)
HP-UX under the hood: practical insight for optimization and troubleshooting

To maximize the performance, efficiency, and reliability of your HP-UX sysem, you need to know what's going on under the hood. HP-UX 11i Internals goes beyond generic UNIX internals, showing exactly how HP-UX works in PA-RISC environments.

HP experts...

Domain Architectures : Models and Architectures for UML Applications
Domain Architectures : Models and Architectures for UML Applications
The last two decennia have witnessed many advances in the area of software
development. The advent of object-oriented programming languages and modelling
languages such as Unified Modeling Language (UML) has increased our ability
as developers to design and realize large and enterprise-wide software systems.
However, software
...
Process-Driven Applications with BPMN
Process-Driven Applications with BPMN

How can we optimize differentiating business processes and exploit their full potential? Here Volker Stiehl provides answers, utilizing the various options that the BPMN (Business Process Model and Notation) standard offers for planning, implementing and monitoring processes.

The book presents an approach for implementing an...

A Theory of Distributed Objects
A Theory of Distributed Objects

Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems.

Caromel and Henrio are the first to define a calculus for distributed...

Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy