Home | Amazing | Today | Tags | Publishers | Years | Search 
Expert Network Time Protocol: An Experience in Time with NTP
Expert Network Time Protocol: An Experience in Time with NTP

Have you ever tried to figure out why your computer clock is off, or why your emails somehow have the wrong timestamp? Most likely, it’s due to an incorrect network time synchronization, which can be reset using the Network Time Protocol. Until now, most network administrators have been too paranoid to work with this, afraid that they...

Pro .NET 2.0 Windows Forms and Custom Controls in VB 2005
Pro .NET 2.0 Windows Forms and Custom Controls in VB 2005

Pro .NET 2.0 Windows Forms and Custom Controls in VB 2005 is the VB 2005 version of the author's best-selling and highly-reviewed Pro .NET 2.0 Windows Forms and Custom Controls in C#. Renowned author Matthew MacDonald shows you VB 2005 programmers how to design flexible, user-friendly Windows interfaces. And you'll learn the...

TCP/IP Lean: Web Servers for Embedded Systems (2nd Edition)
TCP/IP Lean: Web Servers for Embedded Systems (2nd Edition)
Internet programming demystified! This is a hands-on guide to TCP/IP networking that includes platform-independent source code to a simple TCP/IP stack - a lean version that is easier to present and efficient enough to use in embedded applications. Create

Implement an embedded TCP/IP stack that supports a Web server capable of providing
...
Data Structures and Algorithms in Java
Data Structures and Algorithms in Java

This new book provides a concise and engaging introduction to Java and object-oriented programming with an abundance of original examples, use of Unified Modeling Language throughout, and coverage of the new Java 1.5. Addressing critical concepts up front, the book's five-part structure covers...

Modelling with AutoCAD 2002
Modelling with AutoCAD 2002
New features in AutoCAD 2002 are covered in this book, making it a useful refresher course for anyone using AutoCAD at this level, and those upgrading to the new software release. The course is also designed to be fully relevant to anyone using other recent releases, including AutoCAD 2000.

*A self-paced learning experience introducing
...
Outsourcing Information Security (Computer Security Series)
Outsourcing Information Security (Computer Security Series)
This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book...
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection, First Edition
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest...
Telecommunications Optimization: Heuristic and Adaptive Techniques
Telecommunications Optimization: Heuristic and Adaptive Techniques
Each of us is interested in optimization, and telecommunications. Via several meetings,
conferences, chats, and other opportunities, we have discovered these joint interests and
decided to put together this book.
It certainly wasn’t easy. What made it difficult is partly the reason for this book in the
first place: things
...
Head First HTML with CSS & XHTML
Head First HTML with CSS & XHTML

Tired of reading HTML books that only make sense after you're an expert? Then it's about time you picked up Head First HTML with CSS & XHTML and really learned HTML. You want to learn HTML so you can finally create those web pages you've always wanted, so you can communicate more effectively with friends, family,...

Writing Scientific Software: A Guide to Good Style
Writing Scientific Software: A Guide to Good Style
The core of scientific computing is designing, writing, testing, debugging and modifying numerical software for application to a vast range of areas: from graphics, meteorology and chemistry to engineering, biology and finance. Scientists, engineers and computer scientists need to write good code, for speed, clarity, flexibility and ease of re-use....
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Why purchase expensive add-on cards or bus interfaces when you can develop effective and economical data acquisition and process controls using C programs? Using the under-employed printer adapter (that is, the parallel port of your PC), you can turn your computer into a powerful tool for developing microprocessor applications. Learn how to build a...
Introduction to Java Programming-Comprehensive Version (6th Edition)
Introduction to Java Programming-Comprehensive Version (6th Edition)

Now integrating Java 5 throughout, this reference introduces Java programming fundamentals – including problem-solving, object-oriented programming, GUI programming, data structures, networking, internationalization, advanced GUI programming, and Web programming. Includes many new...

Result Page: 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 776 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy