Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Monitoring with Ganglia
Monitoring with Ganglia
In 1999, I packed everything I owned into my car for a cross-country trip to begin my new job as Staff Researcher at the University of California, Berkeley Computer Science Department. It was an optimistic time in my life and the country in general. The economy was well into the dot-com boom and still a few years...
IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
Programming Microsoft LINQ in Microsoft .NET Framework 4
Programming Microsoft LINQ in Microsoft .NET Framework 4

We saw Language Integrated Query (LINQ) for the first time in September 2005, when the LINQ Project was announced during the Professional Developers Conference (PDC 2005). We immediately realized the importance and the implications of LINQ for the long term. At the same time, we felt it would be a huge error to look to LINQ only for its...

OpenGL Insights
OpenGL Insights

OpenGL is not a single API anymore. OpenGL has involved into a family of APIs, with OpenGL, OpenGL ES, and WebGL being closely related siblings that enable application developers to write and deploy graphics applications on a wide variety of platforms and operating systems. OpenGL has become an ecosystem; 3D graphics is truly everywhere now....

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Pervasive Games: Theory and Design (Morgan Kaufmann Game Design Books)
Pervasive Games: Theory and Design (Morgan Kaufmann Game Design Books)
Quickly emerging from the fast-paced growth of mobile communications and wireless technologies, pervasive games take gaming away from the computer screen and back to the three-dimensional world. Now games can be designed to be played in public spaces like shopping malls, conferences, museums and other non-traditional game venues. Game designers...
Interconnection Networks (Computer Architecture and Design)
Interconnection Networks (Computer Architecture and Design)
Interconnection networks are becoming increasingly pervasive in many different applications,
with the operational costs and characteristics of these networks depending considerably
on the application. For some applications, interconnection networks have been
studied in depth for decades. This is the case for telephone networks,
...
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

php/architect's Guide to Enterprise PHP Development
php/architect's Guide to Enterprise PHP Development

We live in a fast-paced world. Looking over the last decade, the world has changed so radically - politically, economically and culturally - that it’s difficult to believe only 10 years have passed. Technology is certainly no exception. It’s easy to overlook the huge changes in the way technology is used in our daily lives - because...

Algorithms in C++ Part 5: Graph Algorithms (3rd Edition) (Pt.5)
Algorithms in C++ Part 5: Graph Algorithms (3rd Edition) (Pt.5)

GRAPHS AND GRAPH algorithms are pervasive in modern computing applications. This book describes the most important known methods for solving the graph-processing problems that arise in practice. Its primary aim is to make these methods and the basic principles behind them accessible to the growing number of people in need of knowing them. The...

Result Page: 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy