Home | Amazing | Today | Tags | Publishers | Years | Search 
Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

Head First iPhone and iPad Development: A Learner's Guide to Creating Objective-C Applications for the iPhone and iPad
Head First iPhone and iPad Development: A Learner's Guide to Creating Objective-C Applications for the iPhone and iPad

Let's say you have a killer app idea for iPhone and iPad. Where do you begin? Head First iPhone and iPad Development will help you get your first application up and running in no time. You'll not only learn how to design for Apple's devices, you'll also master the iPhone SDK tools -- including Interface...

Cooperative Task-Oriented Computing: Algorithms and Complexity
Cooperative Task-Oriented Computing: Algorithms and Complexity

Cooperative network supercomputing is becoming increasingly popular for harnessing the power of the global Internet computing platform. A typical Internet supercomputer consists of a master computer or server and a large number of computers called workers, performing computation on behalf of the master. Despite the simplicity and benefits of...

Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

PHPList 2 E-mail Campaign Manager
PHPList 2 E-mail Campaign Manager

Tired of an e-mail BCC list that scrolls off the page or fiddly and hard-to-manage bulk mailing systems? You need phpList—a high-powered, robust, feature-packed mailing system that will "get out of your way" and get the job done.

phpList 2 E-mail Campaign Manager will guide you from basic installation and setup...

Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)

Concurrent processes can exhibit extremely complicated behavior, and neither informal reasoning nor testing is reliable enough to establish their correctness. In this thesis, we develop a new technique for the verification of parallel programs. The technique is stated in terms of axioms and inference rules, and it is used to prove...

Professional Unified Communications Development with Microsoft Lync Server 2010
Professional Unified Communications Development with Microsoft Lync Server 2010

RATHER THAN SIMPLY REPLACING PHONES and instant messages, Microsoft Lync, Microsoft ’ s Unifi ed Communications platform, makes communicating in completely new ways possible. Lync users can see whether a contact is available and where he or she is located before reaching out. After a user has decided to contact someone, he can...

Mastering VBA for Office 2010
Mastering VBA for Office 2010

Visual Basic for Applications (VBA) is a powerful tool that enables you to automate operations in the Microsoft Offi ce applications and in other applications that host VBA. By automating operations using VBA, you can save yourself and your colleagues huge amounts of time and effort. Getting more work done in less time is usually good...

Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition
Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and...

Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)
Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)

Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy