Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computingand communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such...
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth® wireless technology is a short-range radio standard that provides new opportunities for wireless devices. This radio standard was designed originally as a way of eliminating the cables currently attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized...
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pattern recognition tasks. The first part of the book presents the application of graph theory to...
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Programming Python
Programming Python

If you've mastered Python's fundamentals, you're ready to start using it to get real work done. Programming Python will show you how, with in-depth tutorials on the language's primary application domains: system administration, GUIs, and the Web. You'll also explore how Python is used in databases,...

The R Book
The R Book

R is a high-level language and an environment for data analysis and graphics. The design of R was heavily influenced by two existing languages: Becker, Chambers and Wilks’ S and Sussman’s Scheme. The resulting language is very similar in appearance to S, but the underlying implementation and semantics are derived from Scheme. This...

802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
Monitoring with Ganglia
Monitoring with Ganglia
In 1999, I packed everything I owned into my car for a cross-country trip to begin my new job as Staff Researcher at the University of California, Berkeley Computer Science Department. It was an optimistic time in my life and the country in general. The economy was well into the dot-com boom and still a few years...
Tkinter GUI Application Development Blueprints
Tkinter GUI Application Development Blueprints

Master GUI programming in Tkinter as you design, implement, and deliver ten real-world applications from start to finish

About This Book

  • Conceptualize and build state-of-art GUI applications with Tkinter
  • Tackle the complexity of just about any size GUI application with a structured and...
Dannemora: Two Escaped Killers, Three Weeks of Terror, and the Largest Manhunt Ever in New York State
Dannemora: Two Escaped Killers, Three Weeks of Terror, and the Largest Manhunt Ever in New York State
The Prison Break, the Manhunt, the Inside Story
 
In June 2015, two vicious convicted murderers broke out of the Clinton Correctional Facility in Dannemora, in New York’s North Country, launching the most extensive manhunt in state history. Aided by prison employee Joyce Mitchell, double murderer Richard
...
unlimited object storage image
Result Page: 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy