Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Programming Python
Programming Python

If you've mastered Python's fundamentals, you're ready to start using it to get real work done. Programming Python will show you how, with in-depth tutorials on the language's primary application domains: system administration, GUIs, and the Web. You'll also explore how Python is used in databases,...

Implementing CIFS: The Common Internet File System
Implementing CIFS: The Common Internet File System

"The book that Microsoft should have written, but didn't."
—Jeremy Allison, Samba Team

"Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read."
—J.D. Lindemann, network engineer, Adaptec, Inc.

The...

Understanding Linux Network Internals
Understanding Linux Network Internals

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly...

Culture of Human Stem Cells (Culture of Specialized Cells)
Culture of Human Stem Cells (Culture of Specialized Cells)
The first book to collect the most effective and cutting-edge methods and protocols for deriving and culturing human embryonic and adult stem cells—in one handy resource

This groundbreaking new book follows the tradition of previous books in the Culture of Specialized Cells series—each methods and protocols chapter is laid out...

Cisco IOS XR Fundamentals
Cisco IOS XR Fundamentals

Over the last several years, fiscal discipline has really dominated the industry. Both consumers and businesses expect far more from their communications providers than they did just a few years ago. Offering simple telephone dial tone and an Internet connection are not going to be enough for success. At the same time, however, service providers...

Data and Computer Communications (8th Edition)
Data and Computer Communications (8th Edition)

This book attempts to provide a unified overview of the broad field of data and computer communications. The organization of the book reflects an attempt to break this massive subject into comprehensible parts and to build, piece by piece, a survey of the state of the art.The book emphasizes basic...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

Human Cell Culture Protocols (Methods in Molecular Medicine)
Human Cell Culture Protocols (Methods in Molecular Medicine)

A thoroughly revised and updated collection readily reproducible techniques for culturing human cells. This new edition includes a wide range of human cell types relevant to human disease and new chapters on fibroblasts, Schwann cells, gastric and colonic epithelial cells, and parathyroid cells. The protocols follow the successful Methods in...

DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)
DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)

In early 2004, DTrace remained nascent; while Mike Shapiro, Adam Leventhal, and I had completed our initial implementation in late 2003, it still had substantial gaps (for example, we had not yet completed user-level instrumentation on x86), many missing providers, and many features yet to...

Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout
Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout

Hazardous energy present in systems, machines, and equipment has injured, maimed, and killed many workers. One serious injury can stop the growth of your business in its tracks. Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout provides the practical tools needed to assess hazardous energy in...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy