Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

Web Standards: Mastering HTML5, CSS3, and XML
Web Standards: Mastering HTML5, CSS3, and XML

Web Standards: Mastering HTML5, CSS3, and XML provides solutions to the most common website problems, and gives you a deep understanding of web standards and how they can be applied to improve your website. You will learn how to create fully standards-compliant websites and provide search engine-optimized Web documents with...

Linux Clustering With Csm and Gpfs
Linux Clustering With Csm and Gpfs

This IBM Redbook will guide system architects and systems engineers toward an understanding of cluster technology based on the IBM 1350 Linux Cluster that combines IBM xSeries rack-optimized servers running the Linux operating system with robust systems management and world-class service and support to deliver highly scalable, integrated cluster...

Agile Management for Software Engineering: Applying the Theory of Constraints for Business Results
Agile Management for Software Engineering: Applying the Theory of Constraints for Business Results

A breakthrough approach to managing agile software development. Agile methods might just be the alternative to outsourcing. However, agile development must scale in scope and discipline to be acceptable in the boardrooms of the Fortune 1000. In Agile Management for Software Engineering, David J....

Secret Service: Hidden Systems That Deliver Unforgettable Customer Service
Secret Service: Hidden Systems That Deliver Unforgettable Customer Service

Foreword by Capodagli and Lynn Jackson, coauthors of "The Disney Way". All businesses have customers, but how many of them deliver unforgettably good customer service? "Secret Service" reveals the hidden systems of the few exceptional companies that do: what actions they take behind the scenes to consistently surpass...

Analysis of Piezoelectric Devices
Analysis of Piezoelectric Devices

This is the most systematic, comprehensive and up-to-date book on the theoretical analysis of piezoelectric devices. It is a natural continuation of the author s two previous books: An Introduction to the Theory of Piezoelectricity (Springer, 2005) and The Mechanics of Piezoelectric Structures (World Scientific, 2006). Based on the linear,...

Cisco IOS in a Nutshell
Cisco IOS in a Nutshell

Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and...

Audio Signal Processing for Next-Generation Multimedia Communication Systems
Audio Signal Processing for Next-Generation Multimedia Communication Systems
This book has its origins in the Multimedia Communications Research Center at Bell Laboratories. It will likely be the last thing coming from this Center, since it no longer exists. This book reflects our vision on next-generation multimedia communication systems, shared by many researchers who worked with us at a time in the last several years in...
The Microsoft DirectX 9 Programmable Graphics Pipeline
The Microsoft DirectX 9 Programmable Graphics Pipeline
Interactive 3-D graphics is one of the most rapidly advancing technologies ever applied to entertainment. The clear trend of increasing entertainment richness and sophistication that started with the era of Pong shows no sign of slowing.

Over the next few years, the visual quality and realism of interactive 3-D graphics will grow to
...
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking...
The Complete Reference to Professional SOA with Visual Studio 2005
The Complete Reference to Professional SOA with Visual Studio 2005
Service Oriented Architecture has the potential to be the next great paradigm that will once and for all change computing as we know it. The main promise of Service Oriented Architecture is that business systems can be used by anyone, from anywhere, at any time and on any system.

The popularity in Service Oriented Architecture is largely
...
OPC Unified Architecture
OPC Unified Architecture
The OPC Foundation provides specifications for data exchange in industrial automation. There is a long history of COM/DCOM-based specifications, most prominent OPC Data Access (DA), OPC Alarms and Events (A&E), and OPC Historical Data Access (HDA), which are widely accepted in the industry and implemented by almost every...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy