Trying to find the perfect networking resource or textbook can be a real challenge.
Sometimes they are extremely focused on one technology, and thus miss the mark. Or
they are extremely broad, covering every networking idea known to man. This book is
about something that all networks have in common—the core protocols. Networks...
Let's say you have a killer app idea for iPhone and iPad. Where do you begin? Head First iPhone and iPad Development will help you get your first application up and running in no time. You'll not only learn how to design for Apple's devices, you'll also master the iPhone SDK tools -- including Interface...
Cooperative network supercomputing is becoming increasingly popular for harnessing the power of the global Internet computing platform. A typical Internet supercomputer consists of a master computer or server and a large number of computers called workers, performing computation on behalf of the master. Despite the simplicity and benefits of...
Before the invention of the Internet and the creation of the Web, the vast majority of human
conversations were in spoken form, with the only notable, but extremely limited, exception being
epistolary exchanges. Some important spoken conversations, such as criminal trials and political
debates (e.g., Hansard, the transcripts of...
Tired of an e-mail BCC list that scrolls off the page or fiddly and hard-to-manage bulk mailing systems? You need phpList—a high-powered, robust, feature-packed mailing system that will "get out of your way" and get the job done.
phpList 2 E-mail Campaign Manager will guide you from basic installation and setup...
Concurrent processes can exhibit extremely complicated behavior, and
neither informal reasoning nor testing is reliable enough to establish their
correctness. In this thesis, we develop a new technique for the verification
of parallel programs. The technique is stated in terms of axioms and inference
rules, and it is used to prove...
RATHER THAN SIMPLY REPLACING PHONES and instant messages, Microsoft Lync, Microsoft ’ s
Unifi ed Communications platform, makes communicating in completely new ways possible. Lync
users can see whether a contact is available and where he or she is located before reaching out.
After a user has decided to contact someone, he can...
Visual Basic for Applications (VBA) is a powerful tool that enables you to automate operations
in the Microsoft Offi ce applications and in other applications that host VBA. By automating
operations using VBA, you can save yourself and your colleagues huge amounts of time and
effort. Getting more work done in less time is usually good...
This book is all about wrangling a herd of network computers so that all
display the correct time. This may seem like a really narrow business,
but the issues go far beyond winding the clock on your display taskbar.
Carefully coordinated, reliable, and accurate time is vital for traffic control
in the air and on the ground, buying and...
Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
communications...
Event-based distributed systems are playing an ever increasing role in
areas such as enterprise management, information dissemination, finance,
environmental monitoring and geo-spatial systems. Event-based processing
originated with the introduction of Event-Condition-Action (ECA) rules to
database systems in the 1980s. Since then,...