Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Machine Learning in Action
Machine Learning in Action

After college I went to work for Intel in California and mainland China. Originally my plan was to go back to grad school after two years, but time flies when you are having fun, and two years turned into six. I realized I had to go back at that point, and I didn’t want to do night school or online learning, I wanted to sit on...

Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

Methods of Analysis for Functional Foods and Nutraceuticals, Second Edition
Methods of Analysis for Functional Foods and Nutraceuticals, Second Edition
Functional foods and nutraceuticals encompasses a wide variety of topics ranging from foods with positive health attributes to even dietary supplements. The analysis of this diverse category can create its own set of challenges since sometimes it is not known what is the active agent. Hence an analyst looks for a marker compound,...
The Archaeology of Athens
The Archaeology of Athens
The city of Athens has played a leading role in the development of European civilization. When we look back through time to the origins of so many of the institutions and activities which thrive or are valued today, we are led to ancient Greece and, most often, to Athens in the Classical period (480–323 B.C.). Time and again...
The Audio Programming Book
The Audio Programming Book

This comprehensive handbook of mathematical and programming techniques for audio signal processing will be an essential reference for all computer musicians, computer scientists, engineers, and anyone interested in audio. Designed to be used by readers with varying levels of programming expertise, it not only provides the foundations for...

Mastering SAP NetWeaver PI - Administration
Mastering SAP NetWeaver PI - Administration

As the core middleware in your system landscape, SAP NetWeaver PI plays an enterprise-critical role. But how can you ensure smooth operation? This book answers your questions. Using a highly detailed scenario as an example, the authors guide you through all administration tasks and provide useful tips for your daily work.

...

Introducing Erlang
Introducing Erlang

If you’re new to Erlang, its functional style can seem difficult, but with help from this hands-on introduction, you’ll scale the learning curve and discover how enjoyable, powerful, and fun this language can be.

Author Simon St. Laurent shows you how to write simple Erlang programs by teaching you one basic...

Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...

Learning PrimeFaces Extensions Development
Learning PrimeFaces Extensions Development

PrimeFaces is a lightweight open source component suite for Java Server Faces (JSF), a Java-based web application framework. Java developers use PrimeFaces for front end UI development, and it can also be applied to both mobile and web applications. It allows users to customize, create, and further develop application features.

...

unlimited object storage image
Result Page: 1156 1155 1154 1153 1152 1151 1150 1149 1148 1147 1146 1145 1144 1143 1142 1141 1140 1139 1138 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy