Home | Amazing | Today | Tags | Publishers | Years | Search 
Understanding Knowledge as a Commons: From Theory to Practice
Understanding Knowledge as a Commons: From Theory to Practice
Knowledge in digital form offers unprecedented access to information through the Internet but at the same time is subject to ever-greater restrictions through intellectual property legislation, overpatenting, licensing, overpricing, and lack of preservation. Looking at knowledge as a commons--as a shared resource--allows us to understand both its...
Video Systems in an IT Environment: The Essentials of Professional Networked Media
Video Systems in an IT Environment: The Essentials of Professional Networked Media
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes technology reviews and the tools to understand and evaluate key aspects of hybrid AV...
Database Administration: The Complete Guide to Practices and Procedures
Database Administration: The Complete Guide to Practices and Procedures

"One of Craig's hallmarks is his ability to write in a clear, easy-to-read fashion. The main purpose of any technical book is to transfer information from writer to reader, and Craig has done an excellent job. He wants the reader to learn—and it shows." —Chris Foot, Senior Oracle Certified Instructor,...

Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
From P2P to Web Services and Grids: Peers in a Client/Server World
From P2P to Web Services and Grids: Peers in a Client/Server World

"From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but...

Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments (Computer Supported Cooperative Work)
Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments (Computer Supported Cooperative Work)

Avatars at Work and Play brings together contributions from leading social scientists and computer scientists who have conducted research on virtual environments used for collaboration and online gaming. They present a well-rounded and state-of-the-art overview of current applications of multi-user virtual environments, ranging...

Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Python Scripting for Computational Science (Texts in Computational Science and Engineering)
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
The goal of this book is to teach computational scientists and engineers how to develop tailored, flexible, and efficient working environments built from small programs (scripts) written in the easy-to-learn, very high-level language Python. The focus is on examples and applications of relevance to computational science: gluing existing...
MPLS Fundamentals
MPLS Fundamentals
As an escalation engineer, I experienced the boom of Multiprotocol Label Switching (MPLS) networking first hand. I saw the first trials of MPLS in service provider networks and saw MPLS successfully expanding further into enterprise networks. In addition, I witnessed new MPLS technologies coming into existence, which the networking industry...
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

The Essential Guide to Flex 2 with ActionScript 3.0
The Essential Guide to Flex 2 with ActionScript 3.0
Flex 2 represents something of a revolution in web applications. It is the next evolutionary step of Flash, which has grown from a web animation tool to a powerful enterprise web design and development tool. with nearly 98% of all web browsers and cellular phones running the Flash player needed to use Flash and Flex applications, knowledge of Flex...
Design Patterns CD
Design Patterns CD
With the profusion of technologies, it's rare to say that a particular book is required reading for developers. Design Patterns: Elements of Reusable Object Oriented Software is one of those indispensable texts for anyone who develops software using objects. This CD-ROM edition contains a hypertext version of the book, along with...
Result Page: 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy