Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Innovation through OpenFlow and SDN: Principles and Design
Network Innovation through OpenFlow and SDN: Principles and Design

Software-defined networking (SDN) technologies powered by the OpenFlow protocol provide viable options to address the bandwidth needs of next-generation computer networks. And, since many large corporations already produce network devices that support the OpenFlow standard, there are opportunities for those who can manage complex and...

Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c
Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c

Setting up a cloud environment is rarely smooth sailing but with this guide to Oracle Enterprise Manager Cloud Control, it just got a lot more manageable. Practical advice and lots of examples make it the ideal assistant.

Overview

  • Perform and set up your cloud environment one step at a time using this...
Cuckoo Malware Analysis
Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox

Overview

  • Learn how to analyze malware in a straightforward way with minimum technical skills
  • Understand the risk of the rise of document-based malware
  • Enhance your malware analysis concepts through illustrations, tips and tricks,...
Getting Started with BeagleBone: Linux-Powered Electronic Projects With Python and JavaScript
Getting Started with BeagleBone: Linux-Powered Electronic Projects With Python and JavaScript

Many people think of Linux as a computer operating system, running on users' desktops and powering servers. But Linux can also be found inside many consumer electronics devices. Whether they're the brains of a cell phone, cable box, or exercise bike, embedded Linux systems blur the distinction between computer and device.
...

Mobile Ad Hoc Robots and Wireless Robotic Systems: Design and Implementation (Premier Reference Source)
Mobile Ad Hoc Robots and Wireless Robotic Systems: Design and Implementation (Premier Reference Source)

The emergence of wireless robotic systems has provided new perspectives on technology. With the combination of several disciplines such as robotic systems, ad hoc networking, telecommunications and more, mobile ad hoc robots have been essential towards the future possibilities of technology.

Mobile Ad Hoc Robots and Wireless...

Moodle 3 Administration - Third Edition
Moodle 3 Administration - Third Edition

Key Features

  • Learn how to plan, install, optimize, customize, and configure Moodle
  • Guarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workload
  • A one-stop guide with a problem-solution approach and a wide range of real-world...
Secure System Design and Trustable Computing
Secure System Design and Trustable Computing

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system...

Mastering Redmine - Second Edition
Mastering Redmine - Second Edition

Key Features

  • Learn Redmine through the basic topics to the mastering ones
  • Customize Redmine without breaking upgrade compatibility
  • Become an expert of Redmine after having read this comprehensive guide with tips, tricks and best practices.

Book Description

...

A Dictionary of Computer Science (Oxford Quick Reference)
A Dictionary of Computer Science (Oxford Quick Reference)

Previously named A Dictionary of Computing, this bestselling dictionary has been renamed A Dictionary of Computer Science, and fully revised by a team of computer specialists, making it the most up-to-date and authoritative guide to computing available. Containing over 6,500 entries and with expanded coverage of multimedia,...

C# 6.0 in a Nutshell: The Definitive Reference
C# 6.0 in a Nutshell: The Definitive Reference

When you have questions about C# 6.0 or the .NET CLR and its core Framework assemblies, this bestselling guide has the answers you need. C# has become a language of unusual flexibility and breadth since its premiere in 2000, but this continual growth means there’s still much more to learn.

Organized around concepts...

Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

Pro Freeware and Open Source Solutions for Business
Pro Freeware and Open Source Solutions for Business

Pro Freeware and Open Source Solutions for Business is a practical guide for the small business owner seeking viable alternative to expensive commercial software packages and subscriptions. This comprehensive look at the powerful alternatives to expensive proprietary software provides an illustrated overview of no-cost software...

Result Page: 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy