Home | Amazing | Today | Tags | Publishers | Years | Search 
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)

Learn how to employ JADE to build multi-agent systems!

JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...

Linux Made Easy: The Official Guide to Xandros 3 for Everyday Users
Linux Made Easy: The Official Guide to Xandros 3 for Everyday Users
Linux is an operating system, just like Windows or Mac OS. If you're looking at this book, you're probably somewhat of a Linux newbie. Maybe you're a Windows refugee--you just can't take it anymore or you want to stop paying through the nose for software and the latest buggy upgrade. Or you just want to try something new.

Linux Made...

Foundation Flash CS3 for Designers
Foundation Flash CS3 for Designers
Flash is one of the most engaging and innovative, and versatile technologies available—allowing the creation of pretty much anything from simple slideshows, animated banners and icons and cartoons, to Rich Internet Applications, Interactive videos, and dynamic user interfaces for web sites, kiosks, or DVDs. The possibilities are endless,...
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Cisco DQOS Exam Certification Guide (IP Telephony Self-Study)
Cisco DQOS Exam Certification Guide (IP Telephony Self-Study)

The official self-study test preparation guide for the Cisco DQOS 9E0-601 and QOS 642-641 exams

This official study guide helps you master all the topics on the DQOS exam, including:

  • QoS concepts, tools, and architectures
  • Classification and marking concepts and tools
  • Queuing in Cisco...
More Programming Pearls: Confessions of a Coder
More Programming Pearls: Confessions of a Coder
What do topics ranging from organic chemistry to Napoleon's campaigns have to do with computer programming? This collection of essays demonstrates the many varied aspects of programming, showing how programming can be both a fun and elegant science.

Some of the essays cover programming techniques, like how profilers can provide insight into the...

Digraphs: Theory, Algorithms and Applications
Digraphs: Theory, Algorithms and Applications
The study of directed graphs has developed enormously over recent decades, yet no book covers more than a tiny fraction of the results from more than 3000 research articles on the topic. Digraphs is the first book to present a unified and comprehensive survey of the subject. In addition to covering the theoretical aspects,...
Net-Centric Approaches to Intelligence and National Security (Kluwer International Series in Engineering and Computer Science)
Net-Centric Approaches to Intelligence and National Security (Kluwer International Series in Engineering and Computer Science)
This volume considers the web architectures and recent developments that make net-centric approaches for intelligence and national security possible. The development of net-centric approaches for intelligence, national and homeland security applications has become a major concern in many areas such as defense intelligence and national and...
Hacking Windows Vista: ExtremeTech
Hacking Windows Vista: ExtremeTech

"Why didn't they ask me before they did that?"

Vista is the most radical revamping of Windows since 1995. But along with all the fantastic improvements, there are a couple of things that drive you up the wall. Maybe you're not seeing the performance you expect. Security is better, but boy, is it annoying. And what's with...

Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect...
Java 2 Primer Plus
Java 2 Primer Plus

Java programming, like all computer programming, requires a dedication to learning and the right study tools. As a Java programmer, I have spent years reading various books on every aspect of Java and analyzing Sun's implementation of it to gain insight into its design philosophies. The Java programming books I have read vary in...

Wikis For Dummies (Computer/Tech)
Wikis For Dummies (Computer/Tech)
Create content, link pages and webs, and grow your wiki

Set up your own wiki for personal or business use

So you want to wiki? This friendly guide gets you up and running in the wiki world in no time, from creating and editing wiki pages and going public to handling maintenance, promotion, and project management. You'll see how to...

Result Page: 825 824 823 822 821 820 819 818 817 816 815 814 813 812 811 810 809 808 807 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy