Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Switching to the Mac: The Missing Manual, Tiger Edition
Switching to the Mac: The Missing Manual, Tiger Edition

It's little wonder that longtime Windows users are migrating in droves to the new Mac. They're fed up with the virus-prone Windows way of life, and they're lured by Apple's well-deserved reputation for producing great all-around computers that are reliable, user-friendly, well designed, and now--with the $500 Mac mini--extremely...

Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobile Information Systems: IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS)
Mobility is perhaps the most important market and technological trend
within information and communication technology. With the advent of new
mobile infrastructures providing higher bandwidth and constant connection
to the network from virtually everywhere, the way people use information
resources is predicted to be radically
...
Inside Direct3D (Dv-Mps Inside)
Inside Direct3D (Dv-Mps Inside)

With the introduction of Microsoft Windows 95, game developers had the opportunity to develop Windows-based games that were far more powerful than was possible with earlier versions of Windows. Even with this capability, however, accessing the multimedia hardware consistently and efficiently was no easy task—that is, until Microsoft...

Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
Pragmatic Version Control Using Git (Pragmatic Starter Kit)
Pragmatic Version Control Using Git (Pragmatic Starter Kit)
Whether you're making the switch from a traditional centralized version control system or are a new programmer just getting started, this book prepares you to start using Git in your everyday programming.

Pragmatic Version Control Using Git starts with an overview of version control systems, and shows how being distributed enables...

WordPress MU 2.8: Beginner's Guide
WordPress MU 2.8: Beginner's Guide
WordPress MU enables you to build a complete, professional blog network. Each user gets their own blog, and can choose their favorite templates and plug-ins, and develop their own content. WordPress MU powers some of the largest blog networks in the world, including the mighty WordPress.com - home to thousands of bloggers.

This book will
...
Implementing Cisco UCS Solutions
Implementing Cisco UCS Solutions

Cisco Unified Computer System is a powerful solution for data centers that can raise efficiency and lower costs. This tutorial helps professionals realize its full potential through a practical, hands-on approach written by two Cisco experts.

Overview

  • Learn about various Cisco UCS equipment options...
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Understand the fundamental factors of data storage system performance and master an essential analytical skill using block trace via applications such as MATLAB and Python tools. You will increase your productivity and learn the best techniques for doing specific tasks (such as analyzing the IO pattern in a quantitative way, identifying the...
Hands-On Deep Learning for Images with TensorFlow: Build intelligent computer vision applications using TensorFlow and Keras
Hands-On Deep Learning for Images with TensorFlow: Build intelligent computer vision applications using TensorFlow and Keras

Explore TensorFlow's capabilities to perform efficient deep learning on images

Key Features

  • Discover image processing for machine vision
  • Build an effective image classification system using the power of CNNs
  • Leverage TensorFlow's capabilities to...
Intelligent Control: A Hybrid Approach Based on Fuzzy Logic, Neural Networks and Genetic Algorithms (Studies in Computational Intelligence)
Intelligent Control: A Hybrid Approach Based on Fuzzy Logic, Neural Networks and Genetic Algorithms (Studies in Computational Intelligence)

Intelligent Control considers non-traditional modelling and control approaches to nonlinear systems. Fuzzy logic, neural networks and evolutionary computing techniques are the main tools used. The book presents a modular switching fuzzy logic controller where a PD-type fuzzy controller is executed first followed by a PI-type...

The Cisco Router Handbook
The Cisco Router Handbook
The definitive guide to designing, implementing, and maintaining a Cisco network. Includes coverage of the latest generation of Cisco technologies and enhanced capabilities, as well as new broadband technologies

Cisco IOS software provides a foundation for meeting all the current and future networking requirements found in today’s...

unlimited object storage image
Result Page: 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy