Home | Amazing | Today | Tags | Publishers | Years | Search 
The Zope Book (Landmark)
The Zope Book (Landmark)
The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope...
Global Distributed Applications With Windows DNA (Artech House Computing Library)
Global Distributed Applications With Windows DNA (Artech House Computing Library)
Provides a full description of the Microsoft Windows Distributed Internet Applications Architecture (DNA), its purpose, and its proper use for Internet applications development. DLC: Microsoft Windows (Computer file).

Welcome to Global Distributed Applications With Windows DNA. You have probably made a number of assumptions simply by
...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Steiner Tree Problems In Computer Communication Networks
Steiner Tree Problems In Computer Communication Networks
The Steiner tree problem is one of the most important combinatorial optimization problems. It has a long history that can be traced back to the famous mathematician Fermat (1601 1665). This book studies three significant breakthroughs on the Steiner tree problem that were achieved in the 1990s, and some important applications of Steiner tree...
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications...
Beginning Python: From Novice to Professional, Second Edition
Beginning Python: From Novice to Professional, Second Edition
Gain a fundamental understanding of Python’s syntax and features with the second edition of Beginning Python, an up–to–date introduction and practical reference. Covering a wide array of Python–related programming topics, including addressing language internals, database integration, network programming, and web...
The Nine Numbers of the Cosmos
The Nine Numbers of the Cosmos
"Drawing upon Descartes's saying, 'What do I know?' Rowan-Robinson asks what we know about the universe. In answer, he has come up with nine numbers that summarize our current understanding of the cosmos. . . . The numbers Rowan-Robinson presents are grounded in scientific research, although more than a little speculation was used in deriving...
MySQL (4th Edition) (Developer's Library)
MySQL (4th Edition) (Developer's Library)
In MySQL, Paul DuBois provides you with a comprehensive guide to one of the most popular relational database systems. As an important contributor to the online documentation for MySQL, Paul uses his day-to-day experience answering questions users post on the MySQL mailing list to pinpoint the problems most users and administrators encounter. The...
Computer System Performance Modeling in Perspective: A Tribute to the Work of Professor Kenneth C. Sevcik
Computer System Performance Modeling in Perspective: A Tribute to the Work of Professor Kenneth C. Sevcik
This book is a tribute to the many contributions that Kenneth C. Sevcik made both as a scholar, and a mentor to numerous young researchers, that was planned on the occasion of his 60th birthday. The project for the book was launched at the end of 2004. Unfortunately it only appears in print after his untimely death due to delays in bringing...
The Mac OS X Command Line: Unix Under the Hood
The Mac OS X Command Line: Unix Under the Hood
Work More Quickly and Easily—and Learn Some New Tricks

The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major
...
Result Page: 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy