Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Exchange Server 2010 Best Practices
Internet Addiction: A Handbook and Guide to Evaluation and Treatment
Internet Addiction: A Handbook and Guide to Evaluation and Treatment

Internet Addiction: A Handbook and Guide to Evaluation and Treatment

"This book provides cutting-edge coverage by expanding the field to include specific problems such as online gaming, cybersex addiction, and gambling addiction. Its extensive attention to dealing with adolescents is essential, given the rapid...

Active Directory Domain Services 2008 How-To
Active Directory Domain Services 2008 How-To

Need fast, reliable, easy-to-implement solutions for Microsoft Active Directory 2008? This book delivers exactly what you’re looking for. You’ll find nearly 250 tested, step-by-step procedures for planning, installing, customizing, and managing Active Directory Domain Services (AD DS) in any production...

Server-side GPS and Assisted-GPS in Java (Artech House Gnss Technologies and Applications)
Server-side GPS and Assisted-GPS in Java (Artech House Gnss Technologies and Applications)

Assisted-GNSS is an interesting field to work in at present. Demand for accurate location is increasing and new satellites and signals are coming online through the GPS modernization program and the emergence of new GNSSs.

This book is a practical exploration of A-GNSS with particular focus on A-GPS. It provides some theoretical...

IBM InfoSphere Replication Server and Data Event Publisher
IBM InfoSphere Replication Server and Data Event Publisher

Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many...

vi and Vim Editors Pocket Reference: Support for every text editing task
vi and Vim Editors Pocket Reference: Support for every text editing task

Many Unix, Linux, and Mac OS X geeks enjoy using the powerful, platform-agnostic text editors vi and Vim, but there are far too many commands for anyone to remember. Author Arnold Robbins has chosen the most valuable commands for vi, Vim, and vi's main clones—vile, elvis, and nvi—and packed them into this...

OECD Information Technology Outlook 2010
OECD Information Technology Outlook 2010

The OECD Information Technology Outlook 2010 has been prepared by the OECD under the guidance of the OECD Committee for Information, Computer and Communications Policy (ICCP), and in particular the Working Party on the Information Economy. This edition is the tenth in a biennial series designed to provide members with a broad overview of...

World on the Edge: How to Prevent Environmental and Economic Collapse
World on the Edge: How to Prevent Environmental and Economic Collapse

When I meet old friends and they ask, "How are you?" I often reply, "I'm fine; it's the world I am worried about." "Aren't we all" is the common response. Most people have a rather vague sense of concern about the future, but some worry about specific threats such as climate change or population...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Software Language Engineering: Third International Conference, SLE 2010
Software Language Engineering: Third International Conference, SLE 2010

We are pleased to present the proceedings of the third international conference on Software Language Engineering (SLE 2010). The conference was held in Eindhoven, the Netherlands during October 12–13, 2010. It was co-located with the ninth international conference on Generative Programming and Component Engineering (GPCE) and the...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Future Generation Information Technology: Second International Conference, FGIT 2010
Future Generation Information Technology: Second International Conference, FGIT 2010

As information technology (IT) becomes specialized and fragmented, it is easy to lose sight that many topics have common threads and because of this, advances in one subdiscipline may transmit to another. The presentation of results between different subdisciplines encourages this interchange for the advancement of IT as a whole.

...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy