Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Exchange Server 2010 Inside Out
Microsoft Exchange Server 2010 Inside Out

Welcome to my tenth book covering the technology in Microsoft Exchange Server and its surrounding ecosystem. I seem to have been constantly writing about Exchange since before its introduction as version 4.0 in March 1996 in books and many articles printed in the redoubtable Windows IT Pro magazine (http://www.windowsitpro.com). All my...

RFID-Enabled Sensor Design and Applications (Integrated Microsystems)
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)

Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars,...

World on the Edge: How to Prevent Environmental and Economic Collapse
World on the Edge: How to Prevent Environmental and Economic Collapse

When I meet old friends and they ask, "How are you?" I often reply, "I'm fine; it's the world I am worried about." "Aren't we all" is the common response. Most people have a rather vague sense of concern about the future, but some worry about specific threats such as climate change or population...

Twilight of the Machines
Twilight of the Machines

“John Zerzan can now credibly claim the honor of being America’s most famous anarchist. His writing is sharp, uncompromising, and tenacious.”—Derrick Jensen, Utne Reader

The mentor of the green anarchist and neo-primitive movements is back with his first book in six years, confronting...

Constraint Satisfaction Techniques for Agent-Based Reasoning
Constraint Satisfaction Techniques for Agent-Based Reasoning

An important aspect of multi agent systems are agent reasoning techniques for problem solving, either at the level of a single agent or at the level of distributed collaboration amongst multiple agents.

Constraint Satisfaction Problems (CSP) prove to be a generic framework which can be applied for modeling and solving a wide range...

Accessing AutoCAD Architecture 2011
Accessing AutoCAD Architecture 2011

Accessing AutoCAD Architecture 2011, 9th edition, is a comprehensive presentation of the tools included in AutoCAD Architecture 2011. The format of the text includes the introduction of tools followed by an explanation of the options of the command and how it is used in the development of drawings. A tool access table is provided for...

Outsmarting Google: SEO Secrets to Winning New Business (Que Biz-Tech)
Outsmarting Google: SEO Secrets to Winning New Business (Que Biz-Tech)

If you own any other books on search engine optimization, throw them out. They belong to the mass of misinformation that has been swimming around for years, keeping people from making their websites truly appealing to search engines. And no surprise, Google loves it.

What I am about to share with you are the real, gritty,...

Desktop Witness: The Do's and Don'ts of Personal Computer Security
Desktop Witness: The Do's and Don'ts of Personal Computer Security

When asked 'who are you?', people in different cultures tend to define themselves fundamentally differently in terms of what their respective culture considers to be most important. In cultures where one's professional and economic status is most important, people say 'I am an engineer', or 'a priest at St...

Bioinformatics: The Machine Learning Approach, Second Edition (Adaptive Computation and Machine Learning)
Bioinformatics: The Machine Learning Approach, Second Edition (Adaptive Computation and Machine Learning)

We have been very pleased, beyond our expectations, with the reception of the first edition of this book. Bioinformatics, however, continues to evolve very rapidly, hence the need for a new edition. In the past three years, fullgenome sequencing has blossomed with the completion of the sequence of the fly and the first draft of the...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture
Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture

Inside the Machine is an introduction to computers that is intended to fill the gap that exists between classic but more challenging introductions to computer architecture, like John L. Hennessy’s and David A.

Patterson’s popular textbooks, and the growing mass of works that are simply too basic...

Understanding Voice Over IP Technology
Understanding Voice Over IP Technology

The technology of voice over IP provides for making telephone calls over data networks such as the Internet and it has now reached critical mass. I know this because as a technology instructor I spend more and more time teaching Voice over IP or “VoIP.” I wrote this book because I couldn’t find any material suitable...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy