Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Rise of the Blogosphere
The Rise of the Blogosphere
In Consilience: The Unity of Knowledge, biologist Edward O. Wilson writes that a “balanced perspective cannot be acquired by studying disciplines in pieces but through pursuit of the consilience among them. Such unification will come hard. But I think it is inevitable. Intellectually it rings true, and it gratifies impulses that rise from the...
Resource Allocation in Wireless Networks: Theory and Algorithms
Resource Allocation in Wireless Networks: Theory and Algorithms

The wireless industry is in the midst of a fundamental shift from providing voice-only services to offering customers an array of multimedia services, including a wide variety of audio, video and data communications capabilities. Future wireless networks will be integrated into every aspect of daily life, and therefore could affect our life...

Cacti 0.8 Network Monitoring
Cacti 0.8 Network Monitoring
Cacti is a web-based, PHP/MySQL graphing solution to monitor network bandwidth with SNMP using the RRDTool engine—developed by Tobi Oeticker who is already the creator of the famous MRTG. RRDtool is a program developed in C and it stores collected data on .rrd files. Cacti's strength lies in the fact that it can be installed and used easily....
MacAddict Guide to Living the iLife
MacAddict Guide to Living the iLife

Macs today come "fully loaded," but unlike your typical fully loaded automobile, Macs do not come with detailed instruction manuals. Instead, the user is often left to fend for him or herself as they try to sort through all that powerful and mysterious software. On the surface, these programs are relatively easy-to-use, but it is...

My New Iphone: 52 Simple Projects to Get You Started
My New Iphone: 52 Simple Projects to Get You Started

You finally did it-you bought the gizmo that everyone's talking about. Maybe you've already figured out how to play music or make phone calls, but then what?

How does the voicemail work? And that keyboard? What about all of those cool apps-which ones do you need, and how do you get them? You need a book like My New iPhone...

The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher
Several years ago, Thomas’s English Muffins had an ad that proclaimed that the tastiness of their muffins was due to the presence of myriad “nooks and crannies.” The same may be said of the Internet. It is in the Internet’s nooks and crannies that the true “tastiness” often lies. Almost every...
The Strategy Gap: Leveraging Technology to Execute Winning Strategies
The Strategy Gap: Leveraging Technology to Execute Winning Strategies

Praise for The Strategy Gap

"With a better handle on the financial pulse of the business, enterprises will be better able to meet the Street’s expectations of financial transparency and corporate accountability. The writers do a masterful job of getting readers to this point of awareness, and further display their insight...

The Battle for Barrels: Peak Oil Myths & World Oil Futures
The Battle for Barrels: Peak Oil Myths & World Oil Futures

The Battle for Barrels demonstrates that the doom and gloom of the peak oil theory is mistaken. Duncan Clarke rebuts the arguments of peak oil’s adherents and discusses the issues they ignore—rising prices, new or future technologies, potential improved exploration, access to restricted world oil zones, changes in...

jQuery: Novice to Ninja
jQuery: Novice to Ninja
No matter what kind of ninja you are—a cooking ninja, a corporate lawyer ninja, or an actual ninja ninja—virtuosity lies in first mastering the basic tools of the trade. Once conquered, it’s then up to the full-fledged ninja to apply that knowledge in creative and inventive ways.

...
Pro PHP Security
Pro PHP Security

The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your
...

Pharmacy Informatics
Pharmacy Informatics

Applies the Principles of Informatics to the Pharmacy Profession
Emphasizes Evidence-Based Practice and Quality Improvement Approaches

Leading the way in the integration of information technology with healthcare, Pharmacy Informatics reflects some of the rapid changes that have developed in...

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy