Home | Amazing | Today | Tags | Publishers | Years | Search 
Concurrent Programming on Windows
Concurrent Programming on Windows

“When you begin using multi-threading throughout an application, the importance of clean architecture and design is critical. . . . This places an emphasis on understanding not only the platform’s capabilities but also emerging best practices. Joe does a great job interspersing best practices alongside theory...

Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery
Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery

Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out response and recovery efforts following Hurricane Katrina. To assist government planning in this...

The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary

Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model...

Your Brain after Chemo: A Practical Guide to Lifting the Fog and Getting Back Your Focus
Your Brain after Chemo: A Practical Guide to Lifting the Fog and Getting Back Your Focus
Chemotherapy saves lives, but new studies—including research led by coauthor Dr. Dan Silverman—reveal that the agents used to kill cancer cells may also impair normal brain function. Even years after treatment, patients report problems with memory, concentrating, multitasking, and word retrieval. As one person put it,...
BTEC National Engineering
BTEC National Engineering

Health and safety is of prime importance to all people working in manufacturing or engineering workplaces. Engineering can be, potentially, one of the most dangerous occupations workers can undertake because of the nature of the machinery, equipment, tools and techniques used. All workers should be protected from danger and risks to their...

OECD Information Technology Outlook 2010
OECD Information Technology Outlook 2010

The OECD Information Technology Outlook 2010 has been prepared by the OECD under the guidance of the OECD Committee for Information, Computer and Communications Policy (ICCP), and in particular the Working Party on the Information Economy. This edition is the tenth in a biennial series designed to provide members with a broad overview of...

Twitterville: How Businesses Can Thrive in the New Global Neighborhoods
Twitterville: How Businesses Can Thrive in the New Global Neighborhoods

Twitter is the most rapidly adopted communication tool in history, going from zero to ten million users in just over two years. On Twitter, word can spread faster than wildfire. Companies no longer have the option of ignoring the conversation.

Unlike other hot social media spaces, Twitterville is dominated by professionals,
...

Sams Teach Yourself Google Analytics in 10 Minutes
Sams Teach Yourself Google Analytics in 10 Minutes

Is your website performing as well as it should? Are you retaining visitors— or losing them too fast? Are you converting lookers to buyers—or are they bouncing from your site before they finish the checkout process? When you want to find out more about the people visiting your website, turn to Google Analytics. Google Analytics is...

Google Web Toolkit 2 Application Development Cookbook
Google Web Toolkit 2 Application Development Cookbook

GWT 2 radically improves web experience for users by using existing Java tools to build no-compromise AJAX for any modern browser. It provides a solid platform so that other great libraries can be built on top of GWT. Creating web applications efficiently and making them impressive, however, is not as easy as it sounds. Writing web...

Network Experiments Manual for Peterson/Davie Computer Networks 4/e
Network Experiments Manual for Peterson/Davie Computer Networks 4/e

Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is to create an environment where networking professionals and students can visualize how networks work, utilizing a software tool that simulates the...

American Cars 1946-1959: Every Model, Year by Year
American Cars 1946-1959: Every Model, Year by Year

From the resumption of automobile production at the close of World War II through the 1950s, the American auto industry would see the births and deaths of several manufacturers, great technological advances, and an era of dramatic styling as a prospering nation asserted its growing mobility. Cars of this period are among the most iconic...

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Result Page: 56 55 54 53 52 51 50 49 48 47 46 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy