Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows PowerShell Cookbook: for Windows, Exchange 2007, and MOM V3
Windows PowerShell Cookbook: for Windows, Exchange 2007, and MOM V3

This Cookbook by Windows PowerShell team developer Lee Holmes provides hundreds of tested scripts that you can use right away to get Microsoft's new tool working for you. More than 150 recipes, combined with a concise task-based introduction to the Windows PowerShell scripting language and environment, make it the perfect look-up guide...

Windows Home Server: Protect and Simplify your Digital Life
Windows Home Server: Protect and Simplify your Digital Life
Secure and share your digital f iles at home.

Access them from virtually anywhere.

Photos. Tax records. Personal correspondence. Music and movies. Your home network contains much of what's vital to your life in today's digital world. You need to secure and back up those files. You need to be...

Discovery Science
Discovery Science
This book constitutes the refereed proceedings of the 5th International Conference on Discovery Science, DS 2002, held in Lübeck, Germany, in November 2002.

The 17 revised full papers and 27 revised short papers presented together with 5 invited contributions were carefully reviewed and selected from 76 submissions. The papers are...

Embedded Multiprocessors: Scheduling and Synchronization (Signal Processing)
Embedded Multiprocessors: Scheduling and Synchronization (Signal Processing)
From the Foreword. . . . . .The intellectual content in this book is high. While some of the methods it describes are relatively simple, most are quite sophisticated. Yet examples are given that concretely demonstrate how these concepts can be applied in practical hardware architectures. Moreover, there is very little overlap with other books on...
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF....

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

How to Cheat at Deploying and Securing RFID
How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security
...
Computational Intelligence: Concepts to Implementations
Computational Intelligence: Concepts to Implementations
Russ Eberhart and Yuhui Shi have succeeded in integrating various natural and engineering disciplines to establish Computational Intelligence. This is the first comprehensive textbook, including lots of practical examples. Professor Shun-ichi Amari, RIKEN Brain Science Institute, Japan

Computational Intelligence describes a large,
...
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
Todays embedded devices and sensor networks are becoming more and more sophisticated, requiring more efficient and highly flexible compilers. Engineers are discovering that many of the compilers in use today are ill-suited to meet the demands of more advanced computer architectures.

Updated to include the latest techniques, The
...
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and...
Do-All Computing in Distributed Systems: Cooperation in the Presence of Adversity
Do-All Computing in Distributed Systems: Cooperation in the Presence of Adversity
Do-All Computing for Distributed Systems: Cooperation in the Presence of Adversity studies algorithmic issues associated with cooperative execution of multiple independent tasks by distributed computing agents including partitionable networks.

Recent results have shed light on the understanding of how adversity affects...

Design, Automation, and Test in Europe: The Most Influential Papers of 10 Years DATE
Design, Automation, and Test in Europe: The Most Influential Papers of 10 Years DATE
The Design, Automation and Test in Europe (DATE) conference celebrated in 2007 its tenth anniversary. As a tribute to the chip and system-level design and design technology community, this book presents a compilation of the three most influential papers of each year. This provides an excellent historical overview of the evolution of a domain that...
Result Page: 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy