Home | Amazing | Today | Tags | Publishers | Years | Search 
Systems Reliability and Failure Prevention (Artech House Technology Management Library)
Systems Reliability and Failure Prevention (Artech House Technology Management Library)
The primary aim of system reliability is the prevention of failures that affect the operational capability of a system. The probability of such failures can be reduced by the following:

• Conservative design—such as ample margins, use of parts and materials with established operating experience, and observing environmental
...
Fundamentals of Embedded Software: Where C and Assembly Meet
Fundamentals of Embedded Software: Where C and Assembly Meet

Fundamentals of Embedded Software: Where C and Assembly Meet is a refreshing alternative to the traditional sophomore text on computer organization and assembly language programming. The text approaches assembly the way it is commonly used in practice¿to implement small, fast, or special-purpose routines...

Foundations of GTK+ Development (Expert's Voice in Open Source)
Foundations of GTK+ Development (Expert's Voice in Open Source)
GTK+ is one of the most influential graphical toolkits for the Linux operating system. It is the technology upon which the GNOME and XFCE desktop environments are based, and it's crucial to have clear understanding of its complexities to build even a simple Linux desktop application. Foundations of GTK+ Development guides you through these...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
First Steps: Developing BizTalk Applications
First Steps: Developing BizTalk Applications
When I first decided to learn about BizTalk, I went to Microsoft’s site and downloaded the 120-day evaluation copy along with all of the available documentation and tutorials. I worked my way through one of the tutorials, and I then purchased a book about BizTalk. Even though the book and the Microsoft documentation were helpful, I still did...
Inside SQLite
Inside SQLite

SQLite is a small, zero-configuration, custom-tailored, embeddable, threadsafe, easily maintainable, transactionoriented, SQL-based, relational database management system. There is no separate install or setup procedure to initialize SQLite before using it. There is no configuration file.

SQLite is open source, and...

Grid Computing Security
Grid Computing Security
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and...
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Linux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 16 of those years.

In that brief time span,
...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Advances in Computer, Information, and Systems Sciences, and Engineering: Proceedings of IETA 2005, TeNe 2005 and EIAE 2005
Advances in Computer, Information, and Systems Sciences, and Engineering: Proceedings of IETA 2005, TeNe 2005 and EIAE 2005
CISSE 2005, the World's first Engineering/Computing and Systems Research E-Conference was the first high-caliber Research Conference in the world to be completely conducted online in real-time via the internet.

CISSE received 255 research paper submissions and the final program included 140 accepted papers, from more than 45 countries. The...

Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Distributed Services with OpenAFS: for Enterprise and Education
Distributed Services with OpenAFS: for Enterprise and Education
This book shows in detail how to build enterprise-level secure,redundant, and highly scalable services from scratch on top of theopen source Linux operating system, suitable for small companies aswell as big universities. The core architecture presented is based onKerberos, LDAP, AFS, and Samba. It is shown how to integrate web,message related,...
Result Page: 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy