Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming in the 1990's: An Introduction to the Calculation of Programmes (Texts and Monographs in Computer Science)
Programming in the 1990's: An Introduction to the Calculation of Programmes (Texts and Monographs in Computer Science)

Programming is a fascinating and challenging subject. Unfortunately, it is rarely presented as such. Most often it is taught by "induction": features of some famous programming languages are given operational meaning (e.g. a loop "goes round and round"), a number of examples are shown, and by induction, we are asked to...

ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
Organizational Communication and Sustainable Development: Icts for Mobility (Premier Reference Source)
Organizational Communication and Sustainable Development: Icts for Mobility (Premier Reference Source)
In this book, three different but converging processes are investigated; sustainable development, globalization and technical development. Each process is complicated and multi-faceted, but here, their mutual interaction, effects and possibilities have gained attention and interest.

“Sustainable development” are words of
...
Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Microsoft System Center Enterprise Suite Unleashed
Microsoft System Center Enterprise Suite Unleashed

Microsoft System Center Enterprise Suite Unleashed is the first and only definitive real-world guide to the entire Microsoft System Center Enterprise Suite. It brings together tips, tricks, best practices, and lessons learned by top consultants who’ve deployed System Center in some of the world’s...

Debugging Linux Systems
Debugging Linux Systems

Debugging Linux Systems discusses the main tools available today to debug 2.6 Linux Kernels. We start by exploring the seemingly esoteric operations of the Kernel Debugger (KDB), Kernel GNU DeBugger (KGDB), the plain GNU DeBugger (GDB), and JTAG debuggers. We then investigate Kernel Probes, a feature that lets you intrude into a kernel...

SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA

For the day-to-day DBA, there are dangers around every corner; monsters waiting to strike down the unsuspecting database with a resource-hungry query, an inefficient data load, or even outright data corruption. When the worst happens, and SQL Server is down, or performance is suffering, customers are quick to complain.. During such difficult...

The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Emerging Wireless Technologies and the Future Mobile Internet
Emerging Wireless Technologies and the Future Mobile Internet
The current Internet is an outgrowth of the ARPANET (Advanced Research Projects Agency Network) that was initiated four decades ago. The TCP/IP (Transmission Control Protocol/Internet Protocol) designed by Vinton Cerf and Robert Kahn in 1973 did not anticipate, quite understandably, such extensive use of wireless channels and...
Joomla! 1.5 SEO
Joomla! 1.5 SEO
Some sites always appear at the top of a search result while others fail to even make it to the top ten. Wouldn't you want to see your site on the first page of any search result? This is not easily feasible if you are depending solely on the marketing guys whom you hire for SEO.

Joomla! SEO will help you to attract more visitors and
...
Pro OpenGL ES for Android
Pro OpenGL ES for Android

In 1985 I brought home a new shiny Commodore Amiga 1000, about one week after they were released. Coming with a whopping 512K of memory, programmable colormaps, a Motorola 68K CPU, and a modern multitasking operating system, it had “awesome” writ all over it. Metaphorically speaking, of course. I thought it might make a...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy