Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)
Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)

Ultra-wideband (UWB) radios are expected to play a revolutionary role in the future of wireless communications systems. The great interest in UWB communications was sparked by FCC rulings in February 2002 that authorized the unlicensed commercial deployment of UWB technology under a strict power control in 7500 MHz of spectrum. This...

Ambient Intelligence: A Novel Paradigm
Ambient Intelligence: A Novel Paradigm
If the space around us could adapt to our needs and intentions, then our lives
would be much simpler. We would have to spend less time on our daily chores,
we would be more productive and, hopefully, we would live in a less worrisome
and, most likely, more secure world.

Ideally, it would be great if we could live our lives
...
Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Book of IRC: The Ultimate Guide to Internet Relay Chat
The Book of IRC: The Ultimate Guide to Internet Relay Chat
ICQ and other new-fangled chat applications may get most of the press, but Internet Relay Chat (IRC) remains the Wild West of real-time online conversations. Populated by the most diverse collection of characters this side of the Mos Eisley cantina scene in Star Wars, IRC will keep you up late chatting with people all over the world. The...
The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
Microsoft SQL Server 2008 Reporting Services Unleashed
Microsoft SQL Server 2008 Reporting Services Unleashed

The authoritative, example-rich guide to Microsoft’s powerful reporting platform

With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL...

Learning Microsoft Windows Server 2012 Dynamic Access Control
Learning Microsoft Windows Server 2012 Dynamic Access Control

When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.

Overview

  • Understand the advantages of using Dynamic Access Control and how it...
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things

With this book, you will learn how to build apps and hardware for the Internet of Things, using Apple's native APIs and industry standard protocols like Bluetooth and HTTPS. You'll start out learning how to access the sensors on the iPhone, move on to building your own accessories using the Arduino and Raspberry
...
Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

unlimited object storage image
Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy