Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced .NET Remoting (C# Edition)
Advanced .NET Remoting (C# Edition)

This text presents a detailed discussion of deployment options (using XML), and is followed by a quick discussion of security and authentication and then managing object lifetimes.

  • Targets two audiences: the “use-it” developers and the “understand-and-extend-it” developers
  • Includes...
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends
Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends
Current and future mobile terminals become increasingly complex because they have to deal with a variety of frequency bands and communication standards. Achieving multi-band/multi-mode functionality is especially challenging for the radio frequency (RF)-transceiver section, due to limitations in terms of frequency-agile RF components...
Neo4j High Performance
Neo4j High Performance

Design, build, and administer scalable graph database systems for your applications using Neo4j

About This Book

  • Explore the numerous components that provide abstractions for pretty much any functionality you need from your persistent graphs
  • Familiarize yourself with how to test the...
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner

Though your application serves its purpose, it might not be a high performer. Learn techniques to accurately predict code efficiency, easily dismiss inefficient solutions, and improve the performance of your application.

Key Features

  • Explains in detail different algorithms and data...
Internet Communication and Qualitative Research: A Handbook for Researching Online (New Technologies for Social Research series)
Internet Communication and Qualitative Research: A Handbook for Researching Online (New Technologies for Social Research series)
"The internet is exploding with possibilities for conducting social research. Mann and Stewart offer the first in-depth consideration of the prospects and potentials for doing qualitative research on-line. This wide ranging, clearly-written book is essential reading for researchers working at the cutting edge of qualitative methodology."...
Cocoa Programming Developer's Handbook
Cocoa Programming Developer's Handbook

The Cocoa programming environment—Apple’s powerful set of clean, object-oriented APIs—is increasingly becoming the basis of almost all contemporary Mac OS X development. With its long history of constant refinement and improvement, Cocoa has matured into a sophisticated programming environment that can make...

Digital Video Distribution in Broadband, Television, Mobile and Converged Networks: Trends, Challenges and Solutions
Digital Video Distribution in Broadband, Television, Mobile and Converged Networks: Trends, Challenges and Solutions

A unique treatment of digital video distribution technology in a business context, Digital Video Distribution in Broadband, Television, Mobile and Converged Networks explores a range of diverse topics within the field through a combination of theory and practice to provide the best possible insight and exposure. The theoretical...

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

Oracle Essentials: Oracle Database 11g
Oracle Essentials: Oracle Database 11g
Oracle is an enormous system, with myriad technologies, options, and releases. Most users-even experienced developers and database administrators-find it difficult to get a handle on the full scope of the Oracle database. And, as each new Oracle version is released, users find themselves under increasing pressure to learn about a whole range of new...
Clinical Data-Mining: Integrating Practice and Research (Pocket Guides to Social Work Research Methods)
Clinical Data-Mining: Integrating Practice and Research (Pocket Guides to Social Work Research Methods)

Clinical Data-Mining (CDM) involves the conceptualization, extraction, analysis, and interpretation of available clinical data for practice knowledge-building, clinical decision-making and practitioner reflection. Depending upon the type of data mined, CDM can be qualitative or quantitative; it is generally retrospective, but may be...

unlimited object storage image
Result Page: 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy