Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Core Protocols: The Definitive Guide
Internet Core Protocols: The Definitive Guide
For network administrators, support professionals, and system designers, intimate knowledge of the network protocols that are the foundation of the Internet is crucial. Internet Core Protocols: The Definitive Guide is a superb summary of the nitty-gritty details of the most important Net standards.

This book assumes you have a working...

Multiagent System Technologies: 5th German Conference, MATES 2007, Leipzig, Germany, September 24-26, 2007, Proceedings
Multiagent System Technologies: 5th German Conference, MATES 2007, Leipzig, Germany, September 24-26, 2007, Proceedings
The German conference on Multi-Agent System Technologies (MATES) provides an interdisciplinary forum for researchers, users, and developers to present and discuss the latest advances in research work as well as prototyped or fielded systems of intelligent agents and multi-agent systems. The conference aims to promote theory and applications and...
Shut Up and Listen: The Truth about How to Communicate at Work
Shut Up and Listen: The Truth about How to Communicate at Work

We are much better communicators when we know more about ourselves, think about how and what we communicate and act according to the changes in our circumstance and environment. These are the principles this book is based on.

So, there are three main sections, starting with a short course in self-awareness so that you can find out...

Real-Time Systems: Scheduling, Analysis, and Verification
Real-Time Systems: Scheduling, Analysis, and Verification
This text is based on two rich sources: (1) materials in lecture notes I taught to senior and graduate-level computer science and electrical engineering students at Rice University and at the University of Houston, and (2) my research in the area of timing analysis and verification of real-time systems since the late 1980s,...
Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
Microsoft PowerPoint 2002 Fast & Easy
Microsoft PowerPoint 2002 Fast & Easy
With Microsoft PowerPoint, users can organize, illustrate, and deliver ideas professionally. Microsoft PowerPoint X Fast & Easy is the quickest way to learn the latest version of Microsoft PowerPoint. With its visual, step-by-step format, readers learn to create presentations that include tables and charts, sound, graphics, animation, and...
Information Modeling for Internet Applications
Information Modeling for Internet Applications

Different kinds of objects containing data are found on the Internet, including structured (e.g., relational) databases, collections of documents, and search engines. On the one hand, creating, storing, manipulating, and retrieving Internet documents can benefit from techniques known from the databases and data modeling...

Mathematics for Informatics and Computer Science (ISTE)
Mathematics for Informatics and Computer Science (ISTE)

How many ways do exist to mix different ingredients, how many chances to win a gambling game, how many possible paths going from one place to another in a network ? To this kind of questions Mathematics applied to computer gives a stimulating and exhaustive answer. This text, presented in three parts (Combinatorics, Probability, Graphs)...

Handbook of Mathematical Methods in Imaging (Springer Reference)
Handbook of Mathematical Methods in Imaging (Springer Reference)

The Handbook of Mathematical Methods in Imaging provides a comprehensive treatment of the mathematical techniques used in imaging science. The material is grouped into two central themes, namely, Inverse Problems (Algorithmic Reconstruction) and Signal and Image Processing. Each section within the themes covers applications (modeling),...

Business Intelligence with SQL Server Reporting Services
Business Intelligence with SQL Server Reporting Services

Business Intelligence with SQL Server Reporting Services helps you deliver business intelligence with panache. Harness the power of the Reporting Services toolkit to combine charts, gauges, sparklines, indicators, and maps into compelling dashboards and scorecards. Create compelling visualizations that seize your audience’s...

CYA Securing IIS 6.0
CYA Securing IIS 6.0
Network System Administrators operate in a high-stress environment, where the competitive demands of the business often run counter to textbook “best practices”. Design and planning lead times can be nonexistent and deployed systems are subject to constant end-runs; but at the end of the day, you, as the Administrator, are held...
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial applications. With growing popularity has come growing complexity. Addressing that complexity, Beowulf Cluster Computing with Linux and...
unlimited object storage image
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy