Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design)
Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design)

The computing world today is in the middle of a revolution: mobile clients and cloud computing have emerged as the dominant paradigms driving programming and hardware innovation today. The Fifth Edition of Computer Architecture focuses on this dramatic shift, exploring the ways in which software and technology in the cloud are accessed...

Math You Can't Use: Patents, Copyright, and Software
Math You Can't Use: Patents, Copyright, and Software
The field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means...
Corrosion Prevention and Protection: Practical Solutions
Corrosion Prevention and Protection: Practical Solutions

There are many books and monographs on corrosion, such as Corrosion and Corrosion Control by H. H. Uhlig and R. W. Revie; Corrosion Engineering by M. G. Fontana and N. D. Greene; Principles and Prevention of Corrosion by D. A. Jones; An Introduction to Corrosion and Protection of Metals by G. Wranglen; and Corrosion for Science and...

Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science)
Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science)
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source...
Sustainable Development in Changing Complex Earth Systems (Sustainable Development Goals Series)
Sustainable Development in Changing Complex Earth Systems (Sustainable Development Goals Series)
This book applies system theory to analyze the operation and structure of the complex earth surface system, including the interactions between society and nature that cause environmental degradation and threats to human populations. The possible ways to harmonize the operation of a global society as a complex system using the United Nation...
Storage Networks: The Complete Reference
Storage Networks: The Complete Reference
This comprehensive guide helps you stay on top of storage networking innovations while understanding the realities of storage networks in the data center. Use the essential concepts of storage networks including architecture, devices, connectivity options, and data organization methods to design and apply comprehensive and successful storage...
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications
Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications
Exclusively dedicated to Mobile TV, this book provides a detailed insight to mobile multimedia characterized efficient compression techniques, protocols formalized by 3GPP or 3GPP2, capabilities of broadcast, and mobile networks for delivering multimedia content. Network requirements such as spectrum; chipsets, software and handsets which enable...
trixbox CE 2.6
trixbox CE 2.6

The open source telephony platform trixbox CE is designed to implement a PBX system with features typically reserved for large enterprise businesses. trixBox allows an individual or organization to set up a telephone system with traditional telephone networks as well as internet-based telephony or VoIP. The task is time consuming and involves a...

Dengue Virus (Current Topics in Microbiology and Immunology)
Dengue Virus (Current Topics in Microbiology and Immunology)

Scientific research on dengue has a long and rich history. The literature has been touched by famous names in medicine- Benjamin Rush, Walter Reed, and Albert Sabin, to name a very few- and has been fertile ground for medical historians . The advances made in those early investigations are all the more remarkable for the limited tools available...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy