Home | Amazing | Today | Tags | Publishers | Years | Search 
Troubleshooting Windows 7 Inside Out: The ultimate, in-depth troubleshooting reference
Troubleshooting Windows 7 Inside Out: The ultimate, in-depth troubleshooting reference

You're beyond the basics, so dive right into troubleshooting Windows 7 -- and really put your PC to work! This supremely organized reference describes hundreds of prevention tips, troubleshooting techniques, and recovery tools in one essential guide. It's all muscle and no fluff. Discover how the experts keep their...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

The Facebook Effect: The Inside Story of the Company That Is Connecting the World
The Facebook Effect: The Inside Story of the Company That Is Connecting the World

IN LITTLE MORE THAN HALF A DECADE, Facebook has gone from a dorm-room novelty to a company with 500 million users. It is one of the fastest growing companies in history, an essential part of the social life not only of teenagers but hundreds of millions of adults worldwide. As Facebook spreads around the globe, it creates surprising...

Robot Manipulator Control: Theory and Practice (Control Engineering, 15)
Robot Manipulator Control: Theory and Practice (Control Engineering, 15)

Discloses the elements of control theory and robot dynamics. Surveys computed-torque control, robust control of robotic manipulators, adaptive control of robotic manipulators, neural network control of robots, force control, and advanced control techniques. Includes information on designing and operating robotic platforms in discussing robot...

Dictionaries in Early Modern Europe: Lexicography and the Making of Heritage
Dictionaries in Early Modern Europe: Lexicography and the Making of Heritage

Dictionaries tell stories of many kinds. The history of dictionaries, of how they were produced, published and used, has much to tell us about the language and the culture of the past. This monumental work of scholarship draws on published and archival material to survey a wide range of dictionaries of western European languages (including...

Oracle Fusion Middleware Patterns
Oracle Fusion Middleware Patterns

Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.

What are...

Sun Web Server: The Essential Guide
Sun Web Server: The Essential Guide

The authoritative, comprehensive guide to Sun Web Server 7.0

 

Sun Web Server is the secure web serving platform of choice for large-scale enterprises in industries from finance and telecommunications to travel and government. Now there’s a...

Managing and Mining Uncertain Data (Advances in Database Systems)
Managing and Mining Uncertain Data (Advances in Database Systems)

Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods...

Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

Patterns of Data Modeling (Emerging Directions in Database Systems and Applications)
Patterns of Data Modeling (Emerging Directions in Database Systems and Applications)

Best-selling author and database expert with more than 25 years of experience modeling application and enterprise data, Dr. Michael Blaha provides tried and tested data model patterns, to help readers avoid common modeling mistakes and unnecessary frustration on their way to building effective data models. Unlike the typical methodology book,...

Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

Web Form Design: Filling in the Blanks
Web Form Design: Filling in the Blanks

Forms make or break the most crucial online interactions: checkout, registration, and any task requiring information entry. In Web Form Design, Luke Wroblewski draws on original research, his considerable experience at Yahoo! and eBay, and the perspectives of many of the field's leading designers to show you everything you need to know...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy