Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Cisco Remote Access Networks
Building Cisco Remote Access Networks
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
Broadband Circuits for Optical Fiber Communication
Broadband Circuits for Optical Fiber Communication
An expert guide to the new and emerging field of broadband circuits for optical fiber communication

This exciting publication makes it easy for readers to enter into and deepen their knowledge of the new and emerging field of broadband circuits for optical fiber communication. The author's selection and organization of material have been...

Microsoft Reporting Services in Action
Microsoft Reporting Services in Action
In archeology, the Rosetta stone was the key that solved the mysteries of Egyptian
hieroglyphics. I believe that with the release of Microsoft SQL Server 2000 Reporting
Services, code-named Rosetta, Microsoft gives organizations the key they need to
unlock the secrets of enterprise data and unleash the power hidden within....
Computer Graphics and Multimedia: Applications, Problems and   Solutions
Computer Graphics and Multimedia: Applications, Problems and Solutions
Making sense of the extensive disciplines and sub-topics within computer
graphics and multimedia is a lifelong challenge. No one can be versed in
all areas at once due to the vast amounts of information that exists on all the
subject areas and due to the dynamic nature of technology. Inevitably, we
specialize. Programmers create
...
Active Directory Infrastructure: How to Cheat at Designing a Windows Server 2003
Active Directory Infrastructure: How to Cheat at Designing a Windows Server 2003
Before the design of any system implementation may commence, first one must assess the
environment into which that system is to be deployed.This argument holds true especially for
Active Directory (AD). Active Directory has the potential to affect every facet of your IT
infrastructure and every team involved with IT, even in the
...
Telebomb: The Truth Behind The $500-Billion Telecom Bust And What The Industry Must Do To Recover
Telebomb: The Truth Behind The $500-Billion Telecom Bust And What The Industry Must Do To Recover
The notorious dot-com crash was heavily covered by the press, but a larger
revolution was going on at the same time in the telecommunications industry
and it received comparatively little attention. The telecommunications
revolution followed a similar trajectory to the dot-com boom and bust, but
it wasted more investor dollars
...
Learn Vertex & Pixel Shader Programming with DirectX 9
Learn Vertex & Pixel Shader Programming with DirectX 9
This book covers all the fundamentals of programming vectors using SIMD methodology in conjunction with the Direct3D 9 application interfaces.

Text shows how to write assembly language for programming the vertex shader and pixel shader hardware using DirectX 9. Covers the fundamentals of programming vectors using SIMD methodology in
...
IPA - Concepts and Applications in Engineering (Decision Engineering)
IPA - Concepts and Applications in Engineering (Decision Engineering)
This book presents the results of extensive research in computer-supported decision
processes in engineering, carried out over many years by the author and his collaborators.
The author has cooperated with designers in Poland and in Germany.Very
often there was university–industry cooperation for the building of specific
...
Adobe After Effects 7.0 Studio Techniques
Adobe After Effects 7.0 Studio Techniques

Ready to learn the visual effects techniques used at such leading-edge studios as Industrial Light + Magic and The Orphanage? Adobe After Effects 7.0 Studio Techniques inspires you to take your work to the next level with real-world examples and insider techniques. With this under-the-hood, in-depth guide to Adobe's updated...

Practical Business Intelligence with SQL Server 2005
Practical Business Intelligence with SQL Server 2005

Design, Build, and Manage High-Value BI Solutions with SQL Server 2005

 

In this book, two of Microsoft’s leading consultants illustrate how to use SQL Server 2005 Business Intelligence (BI) technologies to solve real-world problems in...

Home Networking Basis: Transmission Environments and Wired/Wireless Protocols
Home Networking Basis: Transmission Environments and Wired/Wireless Protocols

This complete technical guide to home network media, protocols, and implementation is the first systematic technical guide to all leading transmission media and communication protocols for in-home networking.

Using detailed simulation techniques provided as MATLAB files and SIMULINK models (downloadable from the companion website),...

Perl Medic : Transforming Legacy Code
Perl Medic : Transforming Legacy Code
Bring new power, performance, and scalability to your existing Perl code!

Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of...

Result Page: 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy