Home | Amazing | Today | Tags | Publishers | Years | Search 
OSx86: Creating a Hackintosh
OSx86: Creating a Hackintosh

Unique guide to installing Apple's Mac OS X software on non-Apple hardware

If you've always wished you could install Apple's rock solid Mac OS X on your non-Apple notebook, budget PC, or power-tower PC, wish no more. Yes, you can, and this intriguing book shows you exactly how. Walk through these step-by-step...

Enterprise Mac Managed Preferences
Enterprise Mac Managed Preferences

Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple’s Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also...

Beginning Ubuntu Linux, Fifth Edition
Beginning Ubuntu Linux, Fifth Edition

Ubuntu Linux is the fastest growing Linux-based operating system, and Beginning Ubuntu Linux, Fifth Edition teaches all of us—including those who have never used Linux—how to use it productively, whether you come from Windows or the Mac or the world of open source.

Beginning Ubuntu Linux, Fifth Edition...

Microsoft System Center Enterprise Suite Unleashed
Microsoft System Center Enterprise Suite Unleashed

Microsoft System Center Enterprise Suite Unleashed is the first and only definitive real-world guide to the entire Microsoft System Center Enterprise Suite. It brings together tips, tricks, best practices, and lessons learned by top consultants who’ve deployed System Center in some of the world’s...

Ant Colony Optimization (Bradford Books)
Ant Colony Optimization (Bradford Books)

The complex social behaviors of ants have been much studied by science, and computer scientists are now finding that these behavior patterns can provide models for solving difficult combinatorial optimization problems. The attempt to develop algorithms inspired by one aspect of ant behavior, the ability to find what computer scientists would...

Distributed Database Management Systems: A Practical Approach
Distributed Database Management Systems: A Practical Approach

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and...

iMac For Dummies
iMac For Dummies

The perennial bestselling iMac book is back—now updated and revised throughout!

If you're eager to discover how to take advantage of the exciting possibilities that an iMac offers, then this is the book for you. From its speed, high performance, powerful operating system, and amazing applications, the iMac is an...

Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems (Embedded Systems)
Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems (Embedded Systems)

For real-time systems, the worst-case execution time (WCET) is the key objective to be considered. Traditionally, code for real-time systems is generated without taking this objective into account and the WCET is computed only after code generation. Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems presents...

Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)
Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)

The main goal of this graduate-level text is to provide a language for understanding, unifying, and implementing a wide variety of algorithms for digital signal processing -- in particular, to provide rules and procedures that can simplify or even automate the task of writing code for the newest parallel and vector machines. It thus bridges...

Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.

This is changing, and quickly. Most records...

Z-80 Microprocessor: Architecture, Interfacing, Programming and Design
Z-80 Microprocessor: Architecture, Interfacing, Programming and Design

This text is intended for microprocessor courses at the undergraduate level in technology and engineering. ll is a comprehensive treatment of the microprocessor. covering both hardware and software based on the Z80 microprocessor family. The text assumes a course in digital logic as a prerequisite; however, it does not assume a background in...

Semantic Knowledge Management: Integrating Ontology Management, Knowledge Discovery, and Human Language Technologies
Semantic Knowledge Management: Integrating Ontology Management, Knowledge Discovery, and Human Language Technologies

Despite its explosive growth over the last decade, the Web remains essentially a tool to allow humans to access information. Semantic Web technologies like RDF, OWL and other W3C standards aim to extend the Web’s capability through increased availability of machine-processable information.

Davies, Grobelnik and Mladenic have...

Result Page: 136 135 134 133 132 131 130 129 128 127 126 125 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy