Home | Amazing | Today | Tags | Publishers | Years | Search 
JUNOS OS For Dummies (Computer/Tech)
JUNOS OS For Dummies (Computer/Tech)

Welcome to Junos OS For Dummies. This book provides you with a handy reference for configuring and running Junos software on Juniper Networks products. (We won’t bore you with how Junos got here, but you can discover more about Juniper Networks and the evolution of Junos software at www.juniper.net/company.)

...

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Encyclopedia of Parallel Computing (Springer Reference)
Encyclopedia of Parallel Computing (Springer Reference)
Parallelism, the capability of a computer to execute operations concurrently, has been a constant throughout the history of computing. It impacts hardware, software, theory, and applications. The fastest machines of the past few decades, the supercomputers, owe their performance advantage to parallelism. Today, physical limitations...
Encyclopedia of Parallel Computing
Encyclopedia of Parallel Computing
Parallelism, the capability of a computer to execute operations concurrently, has been a constant throughout the history of computing. It impacts hardware, software, theory, and applications. The fastest machines of the past few decades, the supercomputers, owe their performance advantage to parallelism. Today, physical limitations...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Computer Systems, Support, and Technology (Computer Science, Technology and Applications)
Computer Systems, Support, and Technology (Computer Science, Technology and Applications)
This book presents and discusses research in the study of computer science. Topics discussed include fuzzy logic in molecular computing; mobile database computing; learning methods for spam filtering; heterogeneous systems; nested relational database systems; advanced array processing techniques and systems and swarm intelligence....
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Think Complexity: Complexity Science and Computational Modeling
Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is usually not taught at...
Virtualization: A Manager's Guide
Virtualization: A Manager's Guide

This book is intended to introduce managers or subject matter experts outside of information technology (IT) to the concepts behind virtualization technology, the different categories of virtualization, and how they are used. It is not meant to replace product documentation. It is not meant as a “how to” guide...

Getting Started with Citrix XenApp 6
Getting Started with Citrix XenApp 6

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure...

OFDMA System Analysis and Design (Artech House Mobile Communication Series)
OFDMA System Analysis and Design (Artech House Mobile Communication Series)

In late 2001, Bill Gates was having dinner with a group of journalists on the night before Microsoft’s launch of the Windows XP operating system. At that time, the dotcom crash was just unfolding, and during dinner, Bill Gates said (correctly) that the dotcom bubble was a distraction and caused a lot of money to be wasted on...

Result Page: 150 149 148 147 146 145 144 143 142 141 140 139 138 137 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy