Home | Amazing | Today | Tags | Publishers | Years | Search 
Community-Built Databases: Research and Development
Community-Built Databases: Research and Development

Communities have built collections of information in a collaborative manner for centuries. Around 250 years ago, more than 140 people wrote l’Encyclopedie in 28 volumes with 70,000 articles. More recently, Wikipedia has demonstrated how collaborative efforts can be a powerful method of building a massive data storage. It is...

Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)
Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)

The specifications in this book are the result of a number of case studies performed by researchers from the Programming Research Group at the University of Amsterdam. The primary goal was to study the use of the techniques developed by the Programming Research Group for the specification of real-life protocols. From the pool of...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Getting Started with Microsoft Lync Server 2013
Getting Started with Microsoft Lync Server 2013

Lync 2013 is a product that enables users to IM, and have audio and video conferences, including multi-party video. The mobile client permits the use of all the features in every device with an access-from-everywhere logic. The company’s Active Directory users, SharePoint documents, and Exchange objects integrate with Lync to deliver...

iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
Apple has a history of alternating its releases between user-focus and developer-focus. The good news about iOS 5 is that it's all about the developers. The addition of Automatic Reference Counting (ARC) alone is worth the upgrade for developers. In one move, Apple has eliminated the number one cause of crashes in iOS applications,...
Citrix XenServer 6.0 Administration Essential Guide
Citrix XenServer 6.0 Administration Essential Guide
Citrix XenServer is a complete, managed server virtualization platform built on the Xen hypervisor. You can use XenServer for virtualizing Microsoft Windows and Linux servers easily and efficiently.

XenServer is the enterprise-ready, cloud-proven virtualization platform that contains all the capabilities required
...
Planning for IPv6
Planning for IPv6
Many readers may be awaiting the third edition of IPv6 Essentials. The event on February 3, 2011, when the IANA (Internet Assigned Numbers Authority) finally announced the depletion of the global IPv4 address pool changed the world. People seemed to wake up and realize it was high time to start planning for IPv6. But where to start?
...
Information Trapping: Real-Time Research on the Web
Information Trapping: Real-Time Research on the Web
For a long time—and especially around 1994, when the World Wide Web was just getting its jumpstart—the Internet appeared to many as a vast pool of information just sitting in cyberspace. People who used the Internet for research “cast their nets” by entering queries into a search engine, and then pulled...
Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
Robotic Welding, Intelligence and Automation (Lecture Notes in Control and Information Sciences)
Robotic Welding, Intelligence and Automation (Lecture Notes in Control and Information Sciences)
Robotic welding systems have been used in different types of manufacturing. They can provide several benefits in welding applications. The most prominent advantages of robotic welding are precision and productivity. Another benefit is that labor costs can be reduced. Robotic welding also reduces risk by moving the human...
VMware Cookbook: A Real-World Guide to Effective VMware Use
VMware Cookbook: A Real-World Guide to Effective VMware Use

With scores of step-by-step solutions, this cookbook helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the basics—how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute them among virtual machines—but also how to...

Google SketchUp for Game Design: Beginner's Guide
Google SketchUp for Game Design: Beginner's Guide

Creating video game environments similar to the best 3D games on the market is now within the capability of hobbyists for the first time, with the free availability of game development software such as Unity 3D, and the ease with which groups of enthusiasts can get together to pool their skills for a game project. The sheer number of these...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy