Home | Amazing | Today | Tags | Publishers | Years | Search 
Speed!: Understanding and Installing Home Networks (Sams Other)
Speed!: Understanding and Installing Home Networks (Sams Other)
This book is more than a guide. It is a valuable reference that is written in plain, non-technical language so readers can put the information to use straightaway. There are descriptions of the latest technologies, protocols, services, and software packages. The reader will unearth methods on how to create an economical and secure network for...
Embracing Insanity: Open Source Software Development
Embracing Insanity: Open Source Software Development
In this book, you will learn where the Open Source movement comes from and what motivates its adherents. You will be introduced to the culture that fuels the movement, as well as the personalities and organizations that promote its growth. You will also understand the strengths of the Open Source movement and how it changes the way in which...
Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
Game Theory: A Critical Introduction
Game Theory: A Critical Introduction
As ever there are people and cats to thank. There is also on this occasion electronic mail. The first draft of this book took shape in various cafeterias in Florence during YV’s visit to Europe in 1992 and matured on beaches and in restaurants during SHH’s visit to Sydney in 1993. Since then the mail wires between Sydney and Norwich, or...
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
I have thought long and hard about this book. This book was not created to make money. It was created to save lives — the lives of first responders and the people they have dedicated their lives to protect, the general public.

What is a first responder? It is a phrase often mentioned in the press but rarely defined.
...
The Economics of Open Source Software Development
The Economics of Open Source Software Development
Open Source Software (OSS) development appears to present a stark contrast to traditional production and innovation methods and an unlikely contestant in the marketplace. Some of the most striking features are that OSS development is based on contributions of volunteer programmers, that these programmers only associated with each other through...
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Sketching User Experiences:  Getting the Design Right and the Right Design (Interactive Technologies)
Sketching User Experiences: Getting the Design Right and the Right Design (Interactive Technologies)
There is almost a fervor in the way that new products, with their rich and dynamic interfaces, are being released to the public-typically promising to make lives easier, solve the most difficult of problems, and maybe even make the world a better place. The reality is that few survive, much less deliver on their promise. The folly? An absence of...
The Linux Cookbook, Second Edition
The Linux Cookbook, Second Edition
The Linux Cookbook, 2nd Edition is your guide to getting the most out of Linux. Organized by general task (such as working with text, managing files, and manipulating graphics), each section contains a series of step-by-step recipes that help you to get your work done quickly and efficiently, most often from the command line. Nearly 50...
Deadly Imbalances
Deadly Imbalances
At the height of its power in the summer of 1942, Hitlerite Germany had enslaved four hundred million people; its empire stretched from the Mediterranean to the Arctic, from the English Channel to the Black Sea and almost to the Caspian. Between the Ukrainian steppes and the Pyrenees only Switzerland remained free. Even Mussolini, whom Hitler once...
Pattern Recognition Using Neural and Functional Networks (Studies in Computational Intelligence)
Pattern Recognition Using Neural and Functional Networks (Studies in Computational Intelligence)
Biologically inspired computing is different from conventional computing. It has a different feel; often the terminology does not sound like it’s talking about machines. The activities of this computing sound more human than mechanistic as people speak of machines that behave, react, self-organize, learn, generalize, remember and even to...
Result Page: 323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy