Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IP Networking over Next-Generation Satellite Systems: International Workshop, Budapest, July 2007
IP Networking over Next-Generation Satellite Systems: International Workshop, Budapest, July 2007
With the boom of Internet, IP-based applications, such as WWW and multimedia, bave been an essential part of our life, and there is an ever-increasing demand for accessing high-speed Internet services anywhere and anytime. This trend unavoidably has huge impacts on the design of the next-generation satellite systems. On the other hand, with its...
Medical Foods from Natural Sources
Medical Foods from Natural Sources
Currently most published books on enteral nutrition support focus only on issues such as the rationale; specific nutrient requirements for various disease conditions; and practical approaches to the delivery, monitoring, and complications preventions while providing enteral nutrition support. None offer information relating to the developmental...
Mastering System Center 2012 R2 Configuration Manager
Mastering System Center 2012 R2 Configuration Manager

Invaluable coverage on all aspects of System Center 2012 R2 Configuration Manager

Completely updated for System Center 2012 R2 Configuration Manager, this comprehensive book provides intermediate and advanced coverage of all aspects of the product, including planning and installation, migrating from previous versions of...

Pro Spring
Pro Spring

Pro Spring updates the perennial bestseller with the latest that the Spring Framework 4 has to offer. Now in its fourth edition, this popular book is by far the most comprehensive and definitive treatment of Spring available.

With Pro Spring, you’ll learn Spring basics and core topics, and share the...

Textbook of Neuroanaesthesia and Critical Care
Textbook of Neuroanaesthesia and Critical Care

Neuroanaesthesia is perhaps the branch of anaesthesia in which the expertise and competence of the anaesthetist can most significantly influence patient outcome. High quality research has driven clinical practice and led to an increasingly multimodal and multidisciplinary approach to patient care. All aspects of the modern practice of...

The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices
The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices

This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...

Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
This book gathers a selection of peer-reviewed papers presented at the Tiangong-2 Data Utilization Conference, which was held in Beijing, China, in December 2018. As the first space laboratory in China, Tiangong-2 carries 3 new types of remote sensing payloads – the Wide-band Imaging Spectrometer (WIS), Three-dimensional Imaging...
Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Topics in Dynamics of Bridges, Volume 3: Proceedings of the 31st IMAC, A Conference on Structural Dynamics, 2013
Topics in Dynamics of Bridges, Volume 3: Proceedings of the 31st IMAC, A Conference on Structural Dynamics, 2013

Topics in Dynamics of Bridges, Volume 3: Proceedings of the 31st IMAC, A Conference and Exposition on Structural Dynamics, 2013, the third volume of seven from the Conference, brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on...

unlimited object storage image
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy