Home | Amazing | Today | Tags | Publishers | Years | Search 
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
The Ultimate CSS Reference
The Ultimate CSS Reference
A complete and thorough and up-to-date reference guide for CSS.

Stop wasting time doing Internet searches only to find inaccurate, out-of-date, or incomplete information. CSS: The Ultimate Reference includes all the ins-and-outs you need to know including compatability information for all major browsers, lists of useful hacks, known...

H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia
H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia

Following on from the successful MPEG-2 standard, MPEG-4 Visual is enabling a new wave of multimedia applications from Internet video streaming to mobile video conferencing. The new H.264 ‘Advanced Video Coding’ standard promises impressive compression performance and is gaining support from developers and manufacturers. The first...

Networked Control Systems: Theory and Applications
Networked Control Systems: Theory and Applications
Networked control systems (NCS) consist of sensors, actuators and controllers the operations of which may be distributed over geographically disparate locations and co-ordinated by the exchange of information passed over a communication network. The communication network may be physically wired or not. The widespread applications of the Internet...
Encyclopedia of Algorithms
Encyclopedia of Algorithms
The Encyclopedia of Algorithms aims to provide the researchers, students, and practitioners of algorithmic research with a mechanism to efficiently and accurately find the names, definitions, key results, and further readings of important algorithmic problems.

The work covers a wide range of algorithmic areas, and each algorithmic area
...
Advanced Rails Recipes: 84 New Ways to Build Stunning Rails Apps (Pragmatic Programmers)
Advanced Rails Recipes: 84 New Ways to Build Stunning Rails Apps (Pragmatic Programmers)
Ruby on Rails continues to build up a tremendous head of steam. Fueled by significant benefits and an impressive portfolio of real-world applications already in production, Rails is destined to continue making significant inroads in coming years.

Each new Rails application showing up on the web adds yet more to the collective wisdom of the...

Usability Engineering (Interactive Technologies)
Usability Engineering (Interactive Technologies)
The purpose of Jakob Nielsen's Usability Engineering is to help nontechnical people improve the systems so that

they are not only error-free but also easier and more pleasant to use, and more efficient. It is a book that ...shows us
how to change the world and does so admirably....One of this book's strengths is that it
...

Java(TM) Look and Feel Design Guidelines (2nd Edition)
Java(TM) Look and Feel Design Guidelines (2nd Edition)
"Great book! Fills a void in the Java world. Necessary reading for all Java developers, designers, and interface designers."
--Theo Mandel, Ph.D., author of The Elements of User Interface Design

The adoption of the Java Look and Feel Design Guidelines has contributed to a consistent user interface that...

Intrusion Detection Systems (Advances in Information Security)
Intrusion Detection Systems (Advances in Information Security)
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems (IDSs).

Intrusion...

IP Routing Primer (Networking Technology)
IP Routing Primer (Networking Technology)
A thorough guide to understanding IP behavior in a router-based networkLearn IP behavior in a Cisco router-based network from an expertExamine proven, effective troubleshooting techniques to eliminate the need for additional technical supportMaster IP fundamentals that everyone supporting an IP network needs to knowStudy visual explanations of...
Designing Network Security
Designing Network Security

A practical guide to creating a secure network infrastructure

* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation
...

Zenoss Core Network and System Monitoring
Zenoss Core Network and System Monitoring
As the world becomes more connected, the complexity of information technology is expanding. Information workers rely on an expanding number of technologies to collaborate: email, instant messaging, web forums, and wikis. Organizations that at one time relied solely on paper are becoming more dependent on information systems. In addition there is an...
Result Page: 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy