Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro WPF in C# 2010: Windows Presentation Foundation in .NET 4
Pro WPF in C# 2010: Windows Presentation Foundation in .NET 4

Microsoft's Windows Presentation Foundation (WPF) provides the foundation for building applications and high-quality user experiences for the Windows operating system. It blends the application user interface, documents, and media content, while exploiting the full power of your computer's operating system.

Its...

The Works: Anatomy of a City
The Works: Anatomy of a City

How much do you really know about the systems that keep a city alive? The Works: Anatomy of a City contains everything you ever wanted to know about what makes New York City run. When you flick on your light switch the light goes on--how? When you put out your garbage, where does it go? When you flush your toilet, what happens to the...

Web Operations: Keeping the Data On Time
Web Operations: Keeping the Data On Time

A web application involves many specialists, but it takes people in web ops to ensure that everything works together throughout an application's lifetime. It's the expertise you need when your start-up gets an unexpected spike in web traffic, or when a new feature causes your mature application to fail. In this collection of...

802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)

This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every...

Advances in Ambient Intelligence: Volume 164 Frontiers in Artificial Intelligence and Applications
Advances in Ambient Intelligence: Volume 164 Frontiers in Artificial Intelligence and Applications

Ambient Intelligence lies at the confluence of several trends: the continued decrease in cost and size of computing technology; the increasing availability of networking and communication infrastructure; the growing public familiarity/comfort with computing artifacts; and practical advances in artificial intelligence. These developments make...

Smart Data: Enterprise Performance Optimization Strategy
Smart Data: Enterprise Performance Optimization Strategy

This book is written for enterprise executives and addresses the single most important activity for which they are ultimately responsible—optimization of performance. Whether you are an executive of government or commercial enterprise, or any other organization, your primary aim is to maximize return from limited resources to accomplish...

Electric Vehicle Battery Systems
Electric Vehicle Battery Systems

Electric Vehicle Battery Systems provides operational theory and design guidance for engineers and technicians working to design and develop efficient electric vehicle (EV) power sources. As Zero Emission Vehicles become a requirement in more areas of the world, the technology required to design and maintain their complex battery systems is...

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

VirtualBox 3.1: Beginner's Guide
VirtualBox 3.1: Beginner's Guide

The furore around virtualization is taking the technology world by storm and is a must for efficient utilization of network server capacity, storage administration, energy, and capital. VirtualBox is free which brings down your upfront costs for an agile data center. VirtualBox will transform your IT infrastructure into a lean data center on...

Handbook of Enterprise Integration
Handbook of Enterprise Integration

Maintaining compatibility among all affected network and application interfaces of modern enterprise systems can quickly become costly and overwhelming. This handbook presents the knowledge and practical experience of a global group of experts from varying disciplines to help you plan and implement enterprise integration projects that respond...

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

Ad Hoc Mobile Wireless Networks: Protocols and Systems
Ad Hoc Mobile Wireless Networks: Protocols and Systems

The authoritative guide to the state of the art in ad hoc wireless networking.

  • Reflects the field's latest breakthroughs

  • Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much...

Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy