Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Deploying and Troubleshooting Cisco Wireless LAN Controllers
Deploying and Troubleshooting Cisco Wireless LAN Controllers

This is the only complete, all-in-one guide to deploying, running, and troubleshooting wireless networks with Cisco® Wireless LAN Controllers (WLCs) and Lightweight Access Point Protocol (LWAPP)/Control and Provisioning of Wireless Access Points (CAPWAP). Authored by two of the most experienced Cisco wireless support...

Make an Arduino-Controlled Robot (Make: Projects)
Make an Arduino-Controlled Robot (Make: Projects)

Building robots that sense and interact with their environment used to be tricky. Now, Arduino makes it easy. With this book and an Arduino microcontroller and software creation environment, you’ll learn how to build and program a robot that can roam around, sense its environment, and perform a wide variety of tasks. All you to...

Microcontroller Programming: The Microchip PIC
Microcontroller Programming: The Microchip PIC

Using the popular and pervasive mid-range 8-bit Microchip PICВ® as an archetype, Microcontroller Programming offers a self-contained presentation of the multidisciplinary tools needed to design and implement modern embedded systems and microcontrollers. The authors begin with basic electronics, number systems, and data concepts followed...

Windows NT SNMP
Windows NT SNMP

As communications networks grow in size and complexity, it becomes increasingly difficult to locally manage and control all of the devices (e.g., routers, servers, and workstations) on those networks. SNMP (Simple Network Management Protocol) gives you a way to manage network devices remotely. You can use SNMP to check on the...

The Definitive Guide to How Computers Do Math : Featuring the Virtual DIY Calculator
The Definitive Guide to How Computers Do Math : Featuring the Virtual DIY Calculator
The Basics of Computer Arithmetic Made Enjoyable and Accessible—with a Special Program Included for Hands-on Learning

"The combination of this book and its associated virtual computer is fantastic! Experience over the last fifty years has shown me that there's only one way to truly understand how computers work; and that is to learn...

RESTful Web Services
RESTful Web Services

"Every developer working with the Web needs to read this book." -- David Heinemeier Hansson, creator of the Rails framework

"RESTful Web Services finally provides a practical roadmap for constructing services that embrace the Web, instead of trying to route around it." -- Adam Trachtenberg, PHP author and
...

Arduino Programming with .NET and Sketch
Arduino Programming with .NET and Sketch

Leverage .NET and Sketch in your Arduino development implementation and integrate it into your .NET program.

There are many Arduino models and compatible shields that can be used in Arduino boards. Integrating between an Arduino platform and .NET technology or Sketch can produce more...

Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Mapping Archaeological Landscapes from Space
Mapping Archaeological Landscapes from Space

'Given the rising awareness and interest in aerial and satellite remote sensing, there is a need to familiarize archaeologists with the basic principles and applications of what have become the most useful technologies. This volume, in the Springerbriefs Archaeologial Heritage Management series, accomplishes this. Contributions to the...

Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)
Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)

This book provides an introduction to concurrent, real-time, distributed programming with Java object-oriented language support as an algorithm description tool. It describes in particular the mechanisms of synchronization (cooperative and competitive) and sharing of data (internal class, static variables) between threads in Java. He...

Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy