Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Networks, Fourth Edition
Computer Networks, Fourth Edition

The world's leading introduction to networking-fully updated for tomorrow's key technologies.

Computer Networks, Fourth Edition is the ideal introduction to today's networks-and tomorrow's. This classic best seller has been thoroughly updated to reflect the newest and...

Flash and XML: A Developer's Guide
Flash and XML: A Developer's Guide

"This book is an exceptional training manual to bring a web developer or flash designer with scripting skills into an entirely new world of coding."-Christopher Ian Smith, XML Developer, RespondTV.com

"This is a 'must-read' for any Flash developer."-John Paul Rawlins, Editor...

New Power: How Power Works in Our Hyperconnected World--and How to Make It Work for You
New Power: How Power Works in Our Hyperconnected World--and How to Make It Work for You
NOW A NATIONAL BESTSELLER

The definitive guide to spreading ideas, building movements, and leaping ahead in our chaotic, connected age. Get the book New York Times columnist David Brooks calls "the best window I’ve seen into this new world."


Why do some leap ahead while others
...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Microsoft ASP. Net coding strategies with the Microsoft ASP. NET team
Microsoft ASP. Net coding strategies with the Microsoft ASP. NET team

Learn the strategies that developers at Microsoft use to build great ASP.NET applications—and get their sample programs! This in-depth insider’s guide shares the hard-won, hard-core coding experience of the Microsoft ASP.NET development team, revealing the most productive ways to exploit ASP.NET features and functionality to...

Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)
Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)

This volume contains both methodological papers showing new original methods, and papers on applications illustrating how new domain-specific knowledge can be made available from data by clever use of data analysis methods. The volume is subdivided in three parts: Classification and Data Analysis; Data Mining; and Applications. The selection...

Result Page: 27 26 25 24 23 22 21 20 19 18 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy