Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.

As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration...

Black & Decker The Complete Guide to Wiring, 5th Edition: Current with 2011-2013 Electrical Codes
Black & Decker The Complete Guide to Wiring, 5th Edition: Current with 2011-2013 Electrical Codes
The world of wiring tends to move in cycles, so to speak. The basic science that causes your blender to whir when you plug the cord into a wall outlet doesn’t change, but the ways we harness and manage electrical power are constantly improving—always with an eye toward safety. The Complete Guide to Wiring changes, too....
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Windows Server 2008 R2 Remote Desktop Services Resource Kit
Windows Server 2008 R2 Remote Desktop Services Resource Kit

In-depth and comprehensive, this official Microsoft RESOURCE KIT delivers the information you need to plan, deploy, and administer Remote Desktop Services in Windows Server 2008 R2. You get authoritative technical guidance from those who know the technology best-leading industry experts and members of the Microsoft Desktop Virtualization...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Case Studies in Bayesian Statistical Modelling and Analysis
Case Studies in Bayesian Statistical Modelling and Analysis

Provides an accessible foundation to Bayesian analysis using real world models

This book aims to present an introduction to Bayesian modelling and computation, by considering real case studies drawn from diverse fields spanning ecology, health, genetics and finance. Each chapter comprises a description of the problem, the...

Laptops For Dummies (Computer/Tech)
Laptops For Dummies (Computer/Tech)
Laptops For Dummies, 3rd Edition shows you how to use your laptop to its fullest potential, from how to purchase a laptop and what to do when you first open the box to how to keep your laptop safe and running smoothly.

You will discover how to choose and purchase the right laptop for you, how to set up and maintain your laptop,...

Advanced Joomla!
Advanced Joomla!

Advanced Joomla! teaches you advanced techniques for customizing a Joomla! CMS, including creating templates, administration, and building extensions. It will provide the technical know-how and a bonanza of information that will allow you to take your Joomla! sites to the next level.

Written by bestselling
...

Experimenting with Raspberry Pi
Experimenting with Raspberry Pi

Need some inspiration for your Raspberry Pi projects? Wondering how to work with Wii nunchucks, stepper motors, how to create a remote control panel? If you need guidance, Experimenting with Raspberry Pi is your own personal idea generator. Experimenting with Raspberry Pi covers how to work with various components and...

Practical Application Development with AppRun: Building Reliable, High-Performance Web Apps Using Elm-Inspired Architecture, Event Pub-Sub, and Components
Practical Application Development with AppRun: Building Reliable, High-Performance Web Apps Using Elm-Inspired Architecture, Event Pub-Sub, and Components

Explore the concepts, patterns, and architecture behind AppRun applications. With this end-to-end guide, you will be able to build web apps fast to the market with the low learning curve and high development productivity.

You will learn how to break down the application logic into three decoupled parts:...

Microsoft Windows XP Professional Resource Kit, Second Edition
Microsoft Windows XP Professional Resource Kit, Second Edition

Install, configure, and support the Windows XP Professional operating system with expertise from the Microsoft Windows team. This official Resource Kit packs more than 1600 pages of in-depth technical information, including two new chapters from the Microsoft Windows Security Resource Kit; a bonus eBook, Automating and...

unlimited object storage image
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy