Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows XP Hacks & Mods For Dummies (Computer/Tech)
Windows XP Hacks & Mods For Dummies (Computer/Tech)
Make Windows XP look, feel, and act the way you want

Simplify searches, find free virus protection, and make Windows love your iPod®

Hacks? Mods? Don't be frightened — this book walks you through each and every one, and even steers you clear of well-known hacks that don't really accomplish anything. See how some simple...

The Gale Encyclopedia of Children's Health: Infancy Through Adolescence
The Gale Encyclopedia of Children's Health: Infancy Through Adolescence

The safety of children is potentially at risk from accidents and injuries, as well as crime. Providing a safe environment, putting prevention measures into practice, and teaching children methods of self-protection are all ways to reduce the potential for harm to children.

Description

Accidents are the leading cause of...

Green Information Technology: A Sustainable Approach
Green Information Technology: A Sustainable Approach

We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres)...

Reliability and Statistics in Geotechnical Engineering
Reliability and Statistics in Geotechnical Engineering

Probabilistic reasoning, statistical methods, and measures of engineering judgment are combined to develop a quantified approach for analyzing and managing risks in civil engineering systems and the applied earth sciences. The resulting risk analysis approach described in this book reflects an emerging trend in geotechnical engineering, natural...

SOI Lubistors: Lateral, Unidirectional, Bipolar-type Insulated-gate Transistors
SOI Lubistors: Lateral, Unidirectional, Bipolar-type Insulated-gate Transistors

Advanced level consolidation of the technology, physics and design aspects of silicon-on-insulator (SOI) lubistors

No comprehensive description of the physics and possible applications of the Lubistor can be found in a single source even though the Lubistor is already being used in SOI LSIs. The book provides, for the...

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Watermarking Systems Engineering
Watermarking Systems Engineering
The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and...
Introducing Windows Server 2008
Introducing Windows Server 2008

Your first look at the next generation of Windows Server-straight from the experts.

Get a jump on evaluating Windows Server 2008-with technical insights direct from the Windows Server team. This practical introduction delivers real-world implementation scenarios and pragmatic advice for administering Windows Server in the enterprise.

...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Managing Virtual Infrastructure with Veeam® ONE(TM)
Managing Virtual Infrastructure with Veeam® ONE(TM)

Discover ways to manage your virtual infrastructure with Veeam® ONE™ in a development environment

About This Book

  • Implement Veeam® ONE™ for 24/7, real-time monitoring and notifications
  • Virtualize your datacenter/server estate and effectively manage your...
Stopping Spyware
Stopping Spyware
Stop spyware in its tracks! Spyware infects the vast majority of home computers today. After it's on your machine, it can be used to access your social security number, track every website you visit, and take control of your computer away from you. If you work for a large company, odds are your company has purchased anti-spyware protection for...
Advances in Enterprise Information Technology Security (Premier Reference)
Advances in Enterprise Information Technology Security (Premier Reference)
In the last decade information and computer security is mainly moving from the confines of academia to the enterprise concerns. As populations become more and more comfortable with the extensive use of networks and the Internet, as our reliance on the knowledge-intensive technology grows, and as progress in the computer software and wireless...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy