Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)
Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty....
Five Stars: Putting Online Reviews to Work for Your Business
Five Stars: Putting Online Reviews to Work for Your Business

Create positive visibility for your business with this essential roadmap

Everyone now understands the importance of online reviews on sites such as Yelp. This unique book helps you influence the process and leverage the results to increase sales and revenue. Five Stars is the perfect guide to a timely and crucial...

IP Network Design Guide
IP Network Design Guide

This redbook identifies some of the basic design aspects of IP networks and explains how to deal with them when implementing new IP networks or redesigning existing IP networks. This project focuses on internetwork and transport layer issues such as address and name management, routing, network management, security, load...

Oxford Handbook of the History of Mathematics (Oxford Handbooks)
Oxford Handbook of the History of Mathematics (Oxford Handbooks)

This Handbook explores the history of mathematics under a series of themes which raise new questions about what mathematics has been and what it has meant to practice it. It addresses questions of who creates mathematics, who uses it, and how. A broader understanding of mathematical practitioners naturally leads to a new appreciation of what...

The Practice of Research on Migration and Mobilities (SpringerBriefs in Environment, Security, Development and Peace) (Volume 14)
The Practice of Research on Migration and Mobilities (SpringerBriefs in Environment, Security, Development and Peace) (Volume 14)

The migration process is interpreted in a different way when researchers live in so-called societies of origin, than when it is interpreted from societies of destination―even when research work is multi-situated. The localization of researchers in this field involves numerous factors that influence the modalities for conducting research....

The Berkeley DB Book (Books for Professionals by Professionals)
The Berkeley DB Book (Books for Professionals by Professionals)
The database technology landscape has been changing rapidly over the last few years. The server-based relational databases, which were so successful in solving the data-storage problem for traditional client/server and web-based applications, are no longer able to meet the requirements of newer applications, such as handheld devices,...
Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Psychiatry today is a barren tundra, writes medical historian Edward Shorter, where drugs that don't work are used to treat diseases that don't exist. In this provocative volume, Shorter illuminates this dismal landscape, in a revealing account of why psychiatry is "losing ground" in the struggle to treat depression.

...
Microsoft Exchange Server 2013 High Availability
Microsoft Exchange Server 2013 High Availability

Design a highly available Exchange 2013 messaging environment using real-world examples

Overview

  • Use the easy-to-follow guidelines and tips to achieve the highest availability
  • Covers all the aspects that need to be considered before, during and after implementation of high availability
  • ...
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Giving a sound technical introduction to 3GPP LTE and SAE, this book explains the decisions taken during standardization while also examining the likely competition for LTE such as HSPA+ and WiMAX. As well as looking at next generation network technologies, Beyond 3G - Bringing Networks, Terminals and the Web Together describes the latest...
Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
The influence of embedded systems is constantly growing. Increasingly powerful and versatile devices are being developed and put on the market at a fast pace. The number of features is increasing, and so are the constraints on the systems concerning size, performance, energy dissipation and timing predictability. Since most systems today use a...
Web Standards Creativity: Innovations in Web Design with XHTML, CSS, and DOM Scripting
Web Standards Creativity: Innovations in Web Design with XHTML, CSS, and DOM Scripting
Here at friends of ED, we know that as a web designer or developer, your work involves more than just working to pay the bills. We know that each day, you strive to push the boundaries of your medium, unleashing your creativity in new ways to make your websites more engaging and attractive to behold, while still maintaining cross-browser support,...
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy