Home | Amazing | Today | Tags | Publishers | Years | Search 
Distributed Systems Architecture: A Middleware Approach
Distributed Systems Architecture: A Middleware Approach
Middleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages. This book describes middleware from two different perspectives: from the viewpoint of the systems programmer and from the viewpoint of the...
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
"I would purchase the books... since I am Ipv6 connected it would be a nice reference."..."I do think that if you buy one you will buy the other, assuming that the chapters are setup correctly." -Randall Stewart, Cisco Systems

"My immediate reaction was that I thought it would be better in one volume, BUT then I
...
Asterisk Hacking
Asterisk Hacking
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all...
Introduction to Mobile Communications: Technology, Services, Markets
Introduction to Mobile Communications: Technology, Services, Markets
The traditionally separate Fixed, Mobile, and Internet sectors are now converging into a single sector with implications for both technology and business. With so much happening, and so many options available, it is increasingly essential for telecommunication professionals to have a clear view of where the industry is heading. This book provides a...
Reconfigurable Computing: Accelerating Computation with Field-Programmable Gate Arrays
Reconfigurable Computing: Accelerating Computation with Field-Programmable Gate Arrays
This volume is unique: the first comprehensive exposition of the exciting new field of Reconfigurable Computing with FPGAs. By mapping algorithms directly into programmable logic, FPGA accelerators offer and deliver 10X-100X performance increases over microprocessors for a large range of application domains. Reconfigurable computing is found in...
Exploring IBM eServer iSeries: The Instant Insider's Guide to IBM's Popular Mid-Range Servers
Exploring IBM eServer iSeries: The Instant Insider's Guide to IBM's Popular Mid-Range Servers
This updated guide to the eServer iSeries of computers from IBM provides an overview and comprehensive reference to the latest models, options, disk storage equipment, printers, and tape drives. It addresses such business issues as lease versus purchase, maintenance strategies, cost justification, and office ergonomics. This resource also includes...
Tricks of the Microsoft(R) Windows Vista(TM) Masters
Tricks of the Microsoft(R) Windows Vista(TM) Masters
All over the world, Windows gurus have been working overtime to uncover the hottest new Windows Vista tips, tricks, and tweaks. Now, J. Peter Bruzzese has collected all their best discoveries in one place: Tricks of the Microsoft® Windows VistaTM Masters!  Bruzzese has interviewed top Windows professionals,...
Practical .NET 2.0 Networking Projects
Practical .NET 2.0 Networking Projects
Practical .NET 2.0 Networking Projects demonstrates some of the key networking technologies that are being made easily accessible through .NET Framework 2.0. It discusses communication between wired machines and between networks and mobile devices. The book teaches you about the technologies by walking you through sample projects in a...
CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

Digital Food Photography
Digital Food Photography
Great food always elicits strong reactions?the smell of freshly baked bread, the taste of a perfectly prepared steak. The job of a food photographer is to elicit that same mouth-watering reaction, but without the benefit of scent or taste. A well-shot photograph can send crowds flocking to a new restaurant or boost the sales of a culinary magazine....
Taxes 2007 For Dummies
Taxes 2007 For Dummies
Tax season doesn’t just have to be about paying Uncle Sam his due. Sure, giving up your hard-earned dollars hurts, but you can turn lemons into lemonade by turning knowledge into immediate and long-term tax savings. What’s more, wising up about your tax situation can only increase your financial savvy and bolster your future...
Result Page: 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy