Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...

Wildlife between Empire and Nation in Twentieth-Century Africa (African Histories and Modernities)
Wildlife between Empire and Nation in Twentieth-Century Africa (African Histories and Modernities)
This book traces the emergence of wildlife policy in colonial eastern and central Africa over the course of a century. Spanning from imperial conquest through the consolidation of colonial rule, the rise of nationalism, and the emergence of neocolonial and neoliberal institutions, this book shows how these fundamental themes of the twentieth...
Program Construction: Calculating Implementations from Specifications
Program Construction: Calculating Implementations from Specifications
Programming is a highly skilled activity, and good programmers are few and far between. In few other professions is the 90-10 rule (90% of the effort goes into the last 10% of the work) so vitally important. Many programmers are able to write programs that 'work' in most circumstances; few programmers know the basic principles of program...
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, is the heart of the OpenBSD firewall and a necessity for any admin working in a BSD environment. With a little effort and this book, you'll gain the insight needed to unlock PF's full potential.

This second edition of The Book of PF has been completely updated and...

Outsmarting Google: SEO Secrets to Winning New Business (Que Biz-Tech)
Outsmarting Google: SEO Secrets to Winning New Business (Que Biz-Tech)

If you own any other books on search engine optimization, throw them out. They belong to the mass of misinformation that has been swimming around for years, keeping people from making their websites truly appealing to search engines. And no surprise, Google loves it.

What I am about to share with you are the real, gritty,...

Neural Network Design and the Complexity of Learning
Neural Network Design and the Complexity of Learning

Using the tools of complexity theory, Stephen Judd develops a formal description of associative learning in connectionist networks. He rigorously exposes the computational difficulties in training neural networks and explores how certain design principles will or will not make the problems easier.

Judd looks beyond the scope
...

Learning Veeam® Backup and Replication for VMware vSphere
Learning Veeam® Backup and Replication for VMware vSphere

Learn how to protect your data in your VMware vSphere infrastructure with Veeam®Backup & Replication

Overview

  • Explore Veeam Backup and Replication v7 infrastructure and its components
  • Create backup, replication, and restore strategies that protect data, your company's most...
Principles of the Business Rule Approach
Principles of the Business Rule Approach

The Business Rule Approach represents a major paradigm shift in business-system design and development. Employing a business-driven approach, the use of business rules has been proven to enhance the effectiveness, flexibility, and efficiency of business systems. The technology is appropriate...

Fuzzy Expert Systems and Fuzzy Reasoning
Fuzzy Expert Systems and Fuzzy Reasoning
The most advanced systems that can emulate human thought

Fuzzy Expert Systems and Fuzzy Reasoning presents new, cutting-edge theories that enable programmers to emulate human thought processes to solve real-life problems. This text begins with an overview and comparison of current approaches, including rule-based and neural net systems that...

From Logic to Logic Programming (Foundations of Computing)
From Logic to Logic Programming (Foundations of Computing)

This mathematically oriented introduction to the theory of logic programming presents a systematic exposition of the resolution method for propositional, first-order, and Horn- clause logics, together with an analysis of the semantic aspects of the method. It is through the inference rule of resolution that both proofs and computations can be...

Selected Cases from the Supreme People’s Court of the People’s Republic of China: Volume 1 (Library of Selected Cases from the Chinese Court)
Selected Cases from the Supreme People’s Court of the People’s Republic of China: Volume 1 (Library of Selected Cases from the Chinese Court)
This volume includes guiding cases of the Supreme People’s Court, cases deliberated on by the Judicial Council/Committee of the Supreme People’s Court, and cases discussed at the Joint Meetings of Presiding Judges from the various tribunals. This book is divided into four sections, including Cases by Justices, Selected...
Process Improvement in Practice: A Handbook for IT Companies
Process Improvement in Practice: A Handbook for IT Companies
Faster – better – cheaper. This is the challenge that software companies face every day. How to meet customer expectations in a world where continuously changing environments, organizations and technology is the rule rather than the exception.

One way to meet these challenges is to share knowledge and experience – use
...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy