Home | Amazing | Today | Tags | Publishers | Years | Search 
CCNP ONT Portable Command Guide (Self-Study Guide)
CCNP ONT Portable Command Guide (Self-Study Guide)
Welcome to ONT! In 2006, Cisco Press came to me and told me, albeit very quietly, that there was going to be a major revision of the CCNP certification exams. Then they asked whether I would be interested in working on a command guide in the same fashion as my previous books for Cisco Press: the Cisco Networking Academy Program ...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Make Projects: Small Form Factor PCs
Make Projects: Small Form Factor PCs
Shoebox sized and smaller, small form factor PCs can pack as much computing muscle as anything from a PDA to a full-sized desktop computer. They consume less power, have few or no moving parts, and are very quiet. Whether you plan to use one as a standalone PC or want to embed it in your next hacking project, a small form factor PC may be the next...
Genetic and Evolutionary Computation for Image Processing and Analysis (EURASIP Book Series on Signal Processing and Communications)
Genetic and Evolutionary Computation for Image Processing and Analysis (EURASIP Book Series on Signal Processing and Communications)
Image analysis and processing is steadily gaining relevance within the large number of application fields to which genetic and evolutionary computation (GEC) techniques are applied. Although more and more examples of such applications can be found in literature, they are scattered, apart from a few exceptions, in proceedings and journals dedicated...
Running Xen: A Hands-On Guide to the Art of Virtualization
Running Xen: A Hands-On Guide to the Art of Virtualization
“This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations.”

—Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems

CCNP ISCW Portable Command Guide (Self-Study Guide)
CCNP ISCW Portable Command Guide (Self-Study Guide)
Welcome to ISCW! In 2006, Cisco Press contacted Scott and told him, albeit very quietly, that there was going to be a major revision of the CCNP certification exams. They then asked whether he would be interested in working on a command guide in the same fashion as his previous books for Cisco Press: the Cisco Networking Academy Program CCNA...
Pattern Recognition, Third Edition
Pattern Recognition, Third Edition
A classic -- offering comprehensive and unified coverage with a balance between theory and practice!

Pattern recognition is integral to a wide spectrum of scientific disciplines and technologies including image analysis, speech recognition and audio classification, communications, computer-aided diagnosis, data mining. The authors,
...
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
A common misconception in the Mac community is that the Mac is more secure than any other operating system on the market. Although this might be true in most side-by-side analyses of security features right out of the box, what this isn’t taking into account is that security tends to get overlooked once the machine starts to be configured for...
Flex 3: A Beginner's Guide
Flex 3: A Beginner's Guide

Essential Skills--Made Easy!

Learn to program with Flex 3, the powerful tool for building multimedia-rich, interactive Flash applications for the Web. Flex 3: A Beginner's Guide is an easy-to-follow, fast-paced tutorial that allows you to fully grasp the fundamentals, including MXML, ActionScript, Flex Builder,...

JavaTM Programming with CORBATM : Advanced Techniques for Building Distributed Applications
JavaTM Programming with CORBATM : Advanced Techniques for Building Distributed Applications
The leading guide for Java developers who build business applications with CORBA Acknowledged experts present advanced techniques and real-world examples for building both simple and complex programs using Java with CORBA. The authors begin with a quick overview of CORBA, Java, object request brokers (ORBs), and EJB components, then quickly move on...
Windows 2000 Security (Networking)
Windows 2000 Security (Networking)
Due to the necessity of instant communication and data transfer in today's business world, a secure computer network is critical. Security is not just your company's firewall. A more detailed strategy is needed to ward off threats from viruses, hackers, and unauthorized users. Microsoft Windows 2000 Security is your complete guide to system and...
Beginning Adobe AIR: Building Applications for the Adobe Integrated Runtime (Programmer to Programmer)
Beginning Adobe AIR: Building Applications for the Adobe Integrated Runtime (Programmer to Programmer)

Beginning Adobe AIR

Adobe Integrated Runtime (AIR) is revolutionizing the way desktop applications are deployed. If you're ready to take advantage of this platform to build desktop-based Rich Internet Applications, then this is the book for you. It presents a step-by-step process, walking you through the features...

Result Page: 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy