Home | Amazing | Today | Tags | Publishers | Years | Search 
Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms
Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms
Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and...
Deploying and Administering Windows Vista Bible
Deploying and Administering Windows Vista Bible
Although analysts expect the majority of enterprises to tread slowly into migration, there certainly will be early adopters, as there are with any system or device. Because Microsoft has announced that it will support Windows 2000 only until the year 2010, enterprises using older versions of Windows will not have much time for leisurely testing and...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
A Standard for Enterprise Project Management (Esi International Project Management)
A Standard for Enterprise Project Management (Esi International Project Management)
Providing structured yet adaptable models of project success within an organization, A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. It also supplies an inventory of practical policies, procedures, techniques, and...
JUNOS For Dummies (Computer/Tech)
JUNOS For Dummies (Computer/Tech)
If you’re in charge of a network, you’re probably aware that the only time anyone notices the network is when it goes down. With JUNOS software and JUNOS For Dummies, a friendly book to help you set it up and manage the software, you might be able to start convincing your clients to believe in magic. Here’s the help you...
Payment Card Industry Data Security Standard Handbook
Payment Card Industry Data Security Standard Handbook

Praise for Payment Card Industry Data Security Standard Handbook

"While providing insightful guidance on a holistic approach to tackling the Dirty Dozen of PCI, this book also teaches the fundamental principles of information security management. The PCI DSS Handbook is a must-read for all levels of...

Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Implementation Guide (Osborne ORACLE Press Series)

Install and Configure Grid Control to Manage Your Oracle Landscape

Build a robust grid computing infrastructure with guidance from an Oracle expert who developed and taught the Grid Control Deep Dive class to Oracle Consulting. Featuring real-world examples and best practices, Oracle...

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Implementing and Managing eGovernment: An International Text
Implementing and Managing eGovernment: An International Text
Check out the companion website at www.sagepub.co.uk/heeks 

Implementing and Managing eGovernment fills an important gap. It provides comprehensive coverage of the e-government issues faced by managers, consultants and other practitioners.

Richard Heeks draws on international examples to guide readers through...

Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy