Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Emergence of International Society in the 1920s
The Emergence of International Society in the 1920s

Chronicling the emergence of an international society in the 1920s, Daniel Gorman describes how the shock of the First World War gave rise to a broad array of overlapping initiatives in international cooperation. Though national rivalries continued to plague world politics, ordinary citizens and state officials found common causes in...

Windows NT/2000 ADSI Scripting for System Administration
Windows NT/2000 ADSI Scripting for System Administration

Scripting provides system administrators an optimal means of automating tedious and time-consuming application, configuration, and management tasks. In addition you can take advantage of new capabilities offered by VBScript, ADSI and Windows Scripting Host. ADSI is particularly important in light of the upcoming release of...

Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

Building Service Provider Networks
Building Service Provider Networks
Learn how to gain the edge of providing the most reliable service-level guarantees to customers

Network and service provider engineers are often faced with the difficult challenge of meeting a less-than-logical service need of a customer–– and at the most reasonable price. In this book, Howard Berkowitz shows network and service...

Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
MCSA/MCSE Self-Paced Training Kit (Exam 70-291)
MCSA/MCSE Self-Paced Training Kit (Exam 70-291)

Welcome to MCSA/MCSE Self−Paced Training Kit (Exam 70−291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Second Edition. This book prepares you for the 70-291 exam by teaching you how to configure, manage, and troubleshoot various aspects of a Microsoft Windows Server 2003 Service...

Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Cfengine 3 Beginner's Guide
Cfengine 3 Beginner's Guide
This book starts off with step-by-step instructions for installing and configuring the CFEngine server and clients, and then moves on to configuring systems using CFEngine scripts. The author then walks you through the policy decision flow as well as conducting system and security audits.

This is followed by
...
Neural Network Programming with Java
Neural Network Programming with Java

Create and unleash the power of neural networks by implementing professional Java code

About This Book

  • Learn to build amazing projects using neural networks including forecasting the weather and pattern recognition
  • Explore the Java multi-platform feature to run your personal neural...
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

unlimited object storage image
Result Page: 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy