Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux Networking Clearly Explained
Linux Networking Clearly Explained

"Bryan Pfaffenberger details the configuration and use of GNOME (as well as Enlightenment and KDE) in greater detail than anyother Linux book out there" David Wall of Amazon.com on Linux Clearly Explained

Bryan Pfaffenberger and Michael Jang bring their focused, step-by-step approach which made Linux
...

High-Speed Cisco Networks: Planning, Design, and Implementation
High-Speed Cisco Networks: Planning, Design, and Implementation
Cisco's routers, hubs, and switches are the core of both the Internet and today's high-speed networks. To make sure you design the right high-speed network for your needs, you need High-Speed Cisco Networks. This book shows you how to: o Sell advanced LAN/WAN technology and its benefits to upper management o Make your department more productive...
IT Investment: Making a Business Case (Computer Weekly Professional Series)
IT Investment: Making a Business Case (Computer Weekly Professional Series)
Frequently not enough attention is given to producing a comprehensive business case or to producing an economic justification for an information systems investment. In fact many organizations are not clear as to what constitutes a sound business case and how to go about producing one. This Professional level book for the Computer Weekly...
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

PC Interfacing and Data Acquisition: Techniques for Measurement, Instrumentation and Control.
PC Interfacing and Data Acquisition: Techniques for Measurement, Instrumentation and Control.
Until fairly recently most scientific data-gathering systems and industrial control procedures were based on electromechanical devices such as chart recorders and analogue gauges. The capability to process and analyse data was rather limited (and in some cases error prone) unless one had access to a minicomputer or mainframe. Today, that situation...
So You Wanna Be an Embedded Engineer: The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder
So You Wanna Be an Embedded Engineer: The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder
Embark on a career in embedded engineering; this practical guide will show you how to succeed!

In this new, highly practical guide, expert embedded designer and manager Lewin Edwards answers the question, "How do I become an embedded engineer?" Embedded professionals agree that there is a treacherous gap between
...
Computer Systems Architecture: a Networking Approach (2nd Edition)
Computer Systems Architecture: a Networking Approach (2nd Edition)

The new edition of Computer Systems Architecture has been brought up to date with extended descriptions of ARM and Itanium processors and an extended

introduction to the field of data communications.  Its established approach emphasizes that the vast majority of modern computers are not stand-alone devices, but cooperate...

Logic in Computer Science: Modelling and Reasoning about Systems
Logic in Computer Science: Modelling and Reasoning about Systems
Recent years have seen the development of powerful tools for verifying hardware and software systems, and increasing interest in that technology from major companies. Students need a basic formal training which allows them to gain sufficient proficiency in using logic-based verification methods. This book addresses these needs by providing a sound...
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform is a text transformation scheme that has found applications in different aspects of the data explosion problem, from data compression to index structures and search. The BWT belongs to a new class of compression algorithms, distinguished by its ability to perform compression by sorted contexts. More recently, the BWT...
Network Infrastructure and Architecture: Designing High-Availability Networks
Network Infrastructure and Architecture: Designing High-Availability Networks
A Comprehensive, Thorough Introduction to High-Speed Networking Technologies and Protocols

Network Infrastructure and Architecture: Designing High-Availability Networks takes a unique approach to the subject by covering the ideas underlying networks, the architecture of the network elements, and the implementation of these elements in optical...

Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the...

MIPS Assembly Language Programming
MIPS Assembly Language Programming
First impressions are important.

To introduce your Assembly Language programming students to the fundamental concepts of contemporary computer architecture, start with a Reduced Instruction Set Computer (RISC).

When students first encounter computer architecture, they need to begin with the basics of modern...

Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy