Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)
Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)

As I write this, Java is just beginning its second decade. Unlike many other computer languages whose influence begins to wane over the years, Java’s has grown stronger with the passage of time. Java leapt to the forefront of Internet programming with its first release. Each subsequent version has solidified that position. Today,...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Microsoft Dynamics CRM 2011 Cookbook
Microsoft Dynamics CRM 2011 Cookbook

Includes over 75 incredible recipes for deploying, configuring, and customizing your CRM application

Overview

  • Step-by-step guide to deploy Dynamics CRM 2011 components, configuring claim-based authentication and IFD deployment
  • Focus on Dynamics CRM 2011 server maintenance and optimization...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Learning Java (The Java Series)
Learning Java (The Java Series)

This book is about the Java™ language and programming environment. If you've been at all active on the Internet in the past few years, you've heard a lot about Java. It's one of the most exciting developments in the history of the Internet, rivaling the creation of the World Wide Web. Java became the darling of the Internet programming...

Web Caching (O'Reilly Internet Series)
Web Caching (O'Reilly Internet Series)
A properly designed cache, by reducing network traffic and improving access times to popular web sites, is a boon to network administrators and web users alike. This book hands you all the technical information you need to design, deploy and operate an effective web caching service. It also covers the...
Linux on HP Integrity Servers
Linux on HP Integrity Servers
Companies are increasingly turning to Linux on HP Integrity systems for high-performance computing, large enterprise and database applications, and 64-bit application development. However, Linux administration in the HP Integrity's Itanium® 2-based environment is significantly different than on conventional IA-32 platforms. Now, there's a...
PHP in a Nutshell
PHP in a Nutshell

Now installed on more than 20 million Internet domains around the world, PHP is an undisputed leader in web programming languages. Database connectivity, powerful extensions, and rich object-orientation are all reasons for its popularity, but nearly everyone would agree that, above all, PHP is one of the easiest languages to...

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
A scientific approach to the new field of critical infrastructure protection

This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve,...

Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

DVD Demystified
DVD Demystified
"This is not merely ‘a’ good book to help you make sense of DVD, it is ‘the’ book that you will return to over and over as you explore and come to understand this exciting new optical media format." - Geoffrey Tully, Multimedia Technology Consultant; former Senior VP of Production, Divx Entertainment

DVD is...

unlimited object storage image
Result Page: 324 323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy