Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Drupal Multimedia
Drupal Multimedia
Information for Drupal administrators and site developers on all aspects of multimedia in Drupal. This book will provide information for administrators and professional site developers who are required to embed multimedia into a Drupal site. The reader needs basic knowledge of Drupal operation, but no experience of how Drupal handles multimedia...
Textile Fiber Microscopy: A Practical Approach
Textile Fiber Microscopy: A Practical Approach

A groundbreaking text to the study of textile fibers that bridges the knowledge gap between fiber shape and end uses

Textile Fiber Microscopy offers an important and comprehensive guide to the study of textile fibers and contains a unique text that prioritizes a review of fibers’ microstructure,...

Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services
Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services

SS7/C7 is a signaling network and protocol that is used worldwide to bring telecommunications networks, both fixed-line and cellular, to life. Setting up phone calls, providing cellular roaming and messaging, and converged voice/data services, such as Internet Call Waiting, are only a few of the vast number of ways that...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Practical Perforce
Practical Perforce

When developers build software, they're able to keep track of all the different versions and all the components they use with software configuration management (SCM) systems. One of the more popular SCM products is Perforce.

Authored by Perforce's own VP of product technology, ...

How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
    Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic...
Java and XML
Java and XML
Two hot topics come together in this developer's guide from Brett McLaughlin, Java and XML. Both Java and XML are cross-platform technologies; by using Java for code and XML for transporting data, you can build truly portable applications. This title is aimed at intermediate to advanced programmers; while XML topics are explained more or...
CISA: Certified Information Systems Auditor Study Guide
CISA: Certified Information Systems Auditor Study Guide
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.

...

Over-the-Road Wireless For Dummies
Over-the-Road Wireless For Dummies
Keep in touch with the office or the grandkids

Set up your laptop or PDA, find hot spots, and keep your stuff safe

Whether you're on the road earning a living or satisfying your urge to roam, this book will help you stay connected to the rest of the world. Here's how to choose...

Visual Perception and Robotic Manipulation: 3D Object Recognition, Tracking and Hand-Eye Coordination
Visual Perception and Robotic Manipulation: 3D Object Recognition, Tracking and Hand-Eye Coordination
As autonomous robots expand into the service domain, new solutions to the challenge of operating in domestic environments must be developed. Widespread adoption of service robots demands high robustness to environmental change and operational wear, and minimal reliance on application specific knowledge. As such, rich sensing modalities such as...
Linux Programming by Example
Linux Programming by Example
Discusses how LINUX works at the system level by learning how and when to manipulate processes, send and catch signals, and use calls, and how to manipulate and read pipes and FIFOs. Softcover.

Linux Programming By Example introduces programmers with some background in C but no knowledge of the specifics of Linux programming
...
unlimited object storage image
Result Page: 575 574 573 572 571 570 569 568 567 566 565 564 563 562 561 560 559 558 557 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy