Home | Amazing | Today | Tags | Publishers | Years | Search 
vi and Vim Editors Pocket Reference: Support for every text editing task
vi and Vim Editors Pocket Reference: Support for every text editing task

Many Unix, Linux, and Mac OS X geeks enjoy using the powerful, platform-agnostic text editors vi and Vim, but there are far too many commands for anyone to remember. Author Arnold Robbins has chosen the most valuable commands for vi, Vim, and vi's main clones—vile, elvis, and nvi—and packed them into this...

OECD Information Technology Outlook 2010
OECD Information Technology Outlook 2010

The OECD Information Technology Outlook 2010 has been prepared by the OECD under the guidance of the OECD Committee for Information, Computer and Communications Policy (ICCP), and in particular the Working Party on the Information Economy. This edition is the tenth in a biennial series designed to provide members with a broad overview of...

World on the Edge: How to Prevent Environmental and Economic Collapse
World on the Edge: How to Prevent Environmental and Economic Collapse

When I meet old friends and they ask, "How are you?" I often reply, "I'm fine; it's the world I am worried about." "Aren't we all" is the common response. Most people have a rather vague sense of concern about the future, but some worry about specific threats such as climate change or population...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Software Language Engineering: Third International Conference, SLE 2010
Software Language Engineering: Third International Conference, SLE 2010

We are pleased to present the proceedings of the third international conference on Software Language Engineering (SLE 2010). The conference was held in Eindhoven, the Netherlands during October 12–13, 2010. It was co-located with the ninth international conference on Generative Programming and Component Engineering (GPCE) and the...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Future Generation Information Technology: Second International Conference, FGIT 2010
Future Generation Information Technology: Second International Conference, FGIT 2010

As information technology (IT) becomes specialized and fragmented, it is easy to lose sight that many topics have common threads and because of this, advances in one subdiscipline may transmit to another. The presentation of results between different subdisciplines encourages this interchange for the advancement of IT as a whole.

...

Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor

Get the inside scoop on Hyper-V for Windows Server 2008 R2

Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to...

Oracle 11g R1/R2 Real Application Clusters Essentials
Oracle 11g R1/R2 Real Application Clusters Essentials

Oracle RAC or Real Application Clusters is a grid computing solution that allows multiple nodes (servers) in a clustered system to mount and open a single database that resides on shared disk storage. Should a single system (node) fail, the database service will still be available on the remaining nodes. Oracle RAC is an integral part of the...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)
The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)

The main purpose of statistical theory is to derive from observations of a random phenomenon an inference about the probability distribution underlying this phenomenon. That is, it provides either an analysis (description) of a past phenomenon, or some predictions about a future phenomenon of a similar nature. In this book, we insist...

Microsoft Data Protection Manager 2010
Microsoft Data Protection Manager 2010

Microsoft Data Protection Manager (DPM) 2010 is a backup and recovery solution which provides continuous data protection for Windows application and file servers to seamlessly integrated disk, tape, and cloud.

This Data Protection Manager book is a practical, step-by-step tutorial that will show you how to effectively back up your...

Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy