|
|
|
|
Retro Gaming HacksMaybe it was the recent Atari 2600 milestone anniversary that fueled nostalgia for the golden days of computer and console gaming. Every Game Boy must ponder his roots from time to time. But whatever is driving the current retro gaming craze, one thing is certain: classic games are back for a big second act, and they're being... | | Hardware and Computer Organization (Embedded Technology)Today, we often take for granted the impressive array of computing machinery that surrounds us and helps us manage our daily lives. Because you are studying computer architecture and digital hardware, you no doubt have a good understanding of these machines, and you’ve probably written countless programs on your PCs and... | | Next Generation Transport Networks: Data, Management, and Control Planes
Covering past, present and future transport networks using three layered planes written by experts in the field.
Targeted at both practitioners and academics as a single source to get an understanding of how transport networks are built and operated
Explains technologies enabling the next generation transport... |
|
|
|
MacIntosh Technology in the Common Hardware Reference PlatformThis book presents specifications and standards for the Apple Macintosh technology cited in the PowerPC Microprocessor Common Hardware Reference Platform (CHRP) specification.
The CHRP specification is a joint publication of Apple Computer, Inc., International Business Machines Corporation, and Motorola, Inc. It defines a common hardware... | | iPhone 3G Portable GeniusYou love your iPhone 3G and you’ve found out that it’s mighty simple to use out-of-the-box, but you might not know that some of its most useful and powerful features are hidden away in obscure parts of the system. You’ve found out that your iPhone 3G doesn't get in your way when you're trying to be productive or creative, but... | | Linux on IBM eserver zSeries and S/390: Best Security PracticesThis IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
... |
|
|
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 |