Home | Amazing | Today | Tags | Publishers | Years | Search 
Internetworking Troubleshooting Handbook (2nd Edition)
Internetworking Troubleshooting Handbook (2nd Edition)
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
Value-Based Software Engineering
Value-Based Software Engineering

The IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Model-Driven Design Using Business Patterns
Model-Driven Design Using Business Patterns

Business applications are designed using profound knowledge about the business domain, such as domain objects, fundamental domain-related principles, and domain patterns. Nonetheless, the pattern community's ideas for software engineering have not impacted at the application level, they are still mostly used for technical problems.

This...

Live Linux(R) CDs: Building and Customizing Bootables (Negus Live Linux Series)
Live Linux(R) CDs: Building and Customizing Bootables (Negus Live Linux Series)

Dream the perfect computer system, then build it to run on a Linux live CD!


A Linux live CD is more than just a Linux system you carry around. Start with...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Standard Codecs: Image Compression to Advanced Video Coding (Telecommunications)
Standard Codecs: Image Compression to Advanced Video Coding (Telecommunications)
A substantially updated edition of "Video Coding: An Introduction to Standard Codecs", (IEE/1999) this book discusses the growth of digital television technology and the revolution in image and video compression (such as JPEG2000, broadcast TV, video phone), highlighting the need for standardization in processing static and moving images...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko has been writing columns for the computer trade press and championing database programming techniques and ANSI/ISO standards via his newsgroup activity for 20 years.

In this complete revision and expansion of his first SQL Puzzles book, he challenges you with his trickiest puzzlesand then helps solve them with a variety of
...
Reliability, Maintainability and Risk: Practical Methods for Engineers
Reliability, Maintainability and Risk: Practical Methods for Engineers
'The latest edition of this practical introduction to the basics of reliabilty, maintainability and safety introduces new sections on the accuracy of reliability prediction methods, common cause failures in systems, and expands and updates the descriptions of recent safety standards, in particular ISO 61508 and the use of 'Safety Integrity Levels'...
Concurrent and Real-Time Programming in Ada
Concurrent and Real-Time Programming in Ada
Ada is the only ISO-standard, object-oriented, concurrent, real-time programming language. It is intended for use in large, long-lived applications where reliability and efficiency are essential, particularly real-time and embedded systems. In this book, Alan Burns and Andy Wellings give a thorough, self-contained account of how the Ada tasking...
X3D: Extensible 3D Graphics for Web Authors (The Morgan Kaufmann Series in Interactive 3D Technology)
X3D: Extensible 3D Graphics for Web Authors (The Morgan Kaufmann Series in Interactive 3D Technology)
In the early days of the Web a need was recognized for a language to display 3D objects through a browser. An HTML-like language, VRML, was proposed in 1994 and became the standard for describing interactive 3D objects and worlds on the Web. 3D Web courses were started, several best-selling books were published, and VRML continues to be used today....
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy