With the boom of Internet, IP-based applications, such as WWW and multimedia, bave been an essential part of our life, and there is an ever-increasing demand for accessing high-speed Internet services anywhere and anytime. This trend unavoidably has huge impacts on the design of the next-generation satellite systems. On the other hand, with its...
Currently most published books on enteral nutrition support focus only on issues such as the rationale; specific nutrient requirements for various disease conditions; and practical approaches to the delivery, monitoring, and complications preventions while providing enteral nutrition support. None offer information relating to the developmental...
Invaluable coverage on all aspects of System Center 2012 R2 Configuration Manager
Completely updated for System Center 2012 R2 Configuration Manager, this comprehensive book provides intermediate and advanced coverage of all aspects of the product, including planning and installation, migrating from previous versions of...
Pro Spring updates the perennial bestseller with the latest that the Spring Framework 4 has to offer. Now in its fourth edition, this popular book is by far the most comprehensive and definitive treatment of Spring available.
With Pro Spring, you’ll learn Spring basics and core topics, and share the...
Neuroanaesthesia is perhaps the branch of anaesthesia in which the expertise and competence of the anaesthetist can most significantly influence patient outcome. High quality research has driven clinical practice and led to an increasingly multimodal and multidisciplinary approach to patient care. All aspects of the modern practice of...
This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...
This book gathers a selection of peer-reviewed papers presented at the Tiangong-2 Data Utilization Conference, which was held in Beijing, China, in December 2018. As the first space laboratory in China, Tiangong-2 carries 3 new types of remote sensing payloads – the Wide-band Imaging Spectrometer (WIS), Three-dimensional Imaging...
The only end-to-end guide to securing Apache Web servers and Web applications
Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.
Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...
Peer-to-peer (P2P) has proven as a most successful way to produce large
scale, reliable, and cost-effective applications, as illustrated for file sharing or
VoIP. P2P storage is an emerging field of application which allows peers to
collectively leverage their resources towards ensuring the reliability and
availability of user...
Topics in Dynamics of Bridges, Volume 3: Proceedings of the 31st IMAC, A Conference and Exposition on Structural Dynamics, 2013, the third volume of seven from the Conference, brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on...