Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Vista®: Home Networking (Epg - Other)
Windows Vista®: Home Networking (Epg - Other)
With more than one Windows Vistabased PC in your home, and all of your digital memories, music and media, and other data stored on one computer, you know that its time to connect your home with a simple home network. Youll get the straightforward, approachable information you need (without the jargon!) to find what kind of network is right for you...
Pragmatic Guide to Git (Pragmatic Guides)
Pragmatic Guide to Git (Pragmatic Guides)

Get up to speed on Git right now with Pragmatic Guide to Git. Task-oriented two-page spreads get you up and running with minimal fuss. Each left-hand page dives into the underlying implementation for each task. The right-hand page contains commands that focus on the task at hand, and cross references to other tasks that are...

Administering VMware Site Recovery Manager 5.0 (VMware Press Technology)
Administering VMware Site Recovery Manager 5.0 (VMware Press Technology)

The Complete, Hands-On Guide to Installing and Configuring VMware Site Recovery Manager 5.0

 

Administering VMware Site Recovery Manager 5.0 is the complete, technical, hands-on guide to VMware Site Recovery Manager (SRM) 5.0...

tmux Taster
tmux Taster

tmux Taster is your short, concise volume to learn about tmux, the terminal multiplexer that allows you to multiplex several virtual consoles. With tmux you can access multiple separate terminal sessions inside a single terminal window or remote terminal session, and do so much more.

Through the seven to-the-point...

Practical Android: 14 Complete Projects on Advanced Techniques and Approaches
Practical Android: 14 Complete Projects on Advanced Techniques and Approaches
Choose the best approach for your app and implement your solution quickly by leveraging complete projects. This book is a collection of practical projects that use advanced Android techniques and approaches, written by Android instructor Mark Wickham. Mark has taught a series of popular classes at Android development conferences...
Grid Enabled Remote Instrumentation (Signals and Communication Technology)
Grid Enabled Remote Instrumentation (Signals and Communication Technology)
Grid architectures, which are viewed as tools for the integration of distributed resources, play a significant role as both managers of computational resources but also as aggregators of measurement instrumentation and pervasive large-scale data acquisition platforms.  The functionality of a grid architecture allows managing, maintaining, and...
Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
This book gathers a selection of peer-reviewed papers presented at the Tiangong-2 Data Utilization Conference, which was held in Beijing, China, in December 2018. As the first space laboratory in China, Tiangong-2 carries 3 new types of remote sensing payloads – the Wide-band Imaging Spectrometer (WIS), Three-dimensional Imaging...
Wireless Internet Handbook: Technologies, Standards, and Applications
Wireless Internet Handbook: Technologies, Standards, and Applications

Wireless applications are definitely the next big thing in communications. Millions of people around the world use the Internet every day—to stay in touch with remote locations, follow the stock market, keep up with the news, check the weather, make travel plans, conduct business, shop, entertain themselves, and learn. The logical next...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Advanced .NET Remoting, Second Edition
Advanced .NET Remoting, Second Edition

With the arrival of .NET remoting, any programmer who wants to work with distributed objects can benefit from Advanced .NET Remoting, a solid tour of basic and expert techniques for working with distributed code on Microsoft's newest platform.

This title's concise, code-centered approach, backed up by judicious...

Hacking Digital Cameras (ExtremeTech)
Hacking Digital Cameras (ExtremeTech)
Why waste a thousand words?

Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole...

Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

unlimited object storage image
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy