Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raspberry Pi Hacks: Tips & Tools for Making Things with the Inexpensive Linux Computer
Raspberry Pi Hacks: Tips & Tools for Making Things with the Inexpensive Linux Computer

With more than 60 practical and creative hacks, this book helps you turn Raspberry Pi into the centerpiece of some cool electronics projects. Want to create a controller for a camera or a robot? Set up Linux distributions for media centers or PBX phone systems? That’s just the beginning of what you’ll find inside...

Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003
Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003

Get real-world guidance—direct from the Microsoft Windows Server 2003 team—for planning and deploying an upgrade from Windows NT 4.o to Windows Server 2003 for your small or medium-sized business. This book delivers straightforward, step-by-step instructions on how to upgrade to an Active Directory directory service environment;...

Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

Java Examples in a Nutshell: A Tutorial Companion to Java in a Nutshell (In a Nutshell (O'Reilly))
Java Examples in a Nutshell: A Tutorial Companion to Java in a Nutshell (In a Nutshell (O'Reilly))

Java Examples in a Nutshell is full of real-world Java programming examples. The second edition of this bestselling book covers Java 1.3 and contains 164 complete, practical programs: over 17,900 lines of densely commented, professionally written Java code covering 20 distinct Java APIs, including Servlets, JavaServer Pages,...

Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management

The Definitive Guide to Protecting Enterprise Data

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...

Exam Ref 70-687 Configuring Windows 8.1 (MCSA)
Exam Ref 70-687 Configuring Windows 8.1 (MCSA)

Fully updated for Windows 8.1! Prepare for Microsoft Exam 70-687 - and help demonstrate your real-world mastery of configuring Windows 8.1 in the enterprise. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA or MCSE...

Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing
Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing

Artificial intelligence (AI) has been in existence almost as long as computers. However, only recently have AI techniques been widely incorporated by companies to enhance

traditional business applications.

Building Intelligent .NET Applications is...

Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Flex 3 with Java
Flex 3 with Java

Flex 3 is a great technology for developing Rich Internet Applications for the Web as well as for the desktop. If you are a developer looking to design great-looking and sophisticated user interfaces that resemble desktop-based applications, and want to utilize an existing server technology such as Java to develop RIAs, this book is for you.

...
Soft Computing in Image Processing (Studies in Fuzziness and Soft Computing)
Soft Computing in Image Processing (Studies in Fuzziness and Soft Computing)

Images have always been very important in human life. Their applications range from primitive communication between humans of all ages to advanced technologies in the industrial, medical and military field. The increased possibilities to capture and analyze images have contributed to the largeness that the scientific field of image processing...

iPad All-in-One For Dummies
iPad All-in-One For Dummies

Slate-style computers have been around for a few years, but it took Apple to make them catch on with the general public in a big way when it introduced the iPad. This small, less than a pound-and-a-half wonder has sold millions of units in its first year for good reason: It’s well designed, feature rich, and opens up a world of...

LDAP Programming, Management, and Integration
LDAP Programming, Management, and Integration
Focusing on the practical application of the Lightweight Directory Access Protocol, this tutorial is geared toward IS professionals and software developers who are responsible for getting the maximum potential from their directories by integrating them with existing processes and applications. As the Internet standard for directory services, LDAP...
Result Page: 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy