Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Internet Telecommunications (Artech House Mobile Communications)
Wireless Internet Telecommunications (Artech House Mobile Communications)
This comprehensive book gives you a hands-on understanding of the techniques and architectures being used to provide voice and data services over wireless networks. It serves as a unified "how it works" guide to wireless Internet telecommunications, systematically addressing each of the technological components and how they fit together....
Upgrading and Repairing Microsoft Windows (Upgrading & Repairing)
Upgrading and Repairing Microsoft Windows (Upgrading & Repairing)

Fans of Upgrading and Repairing PCs, your call has been answered. Scott Mueller, author of the best-selling Upgrading and Repairing PCs, is now bringing you an equally in-depth guide to Windows troubleshooting. Upgrading and Repairing Microsoft Windows explains how Windows works and how to fix it when...

Programming WCF Services
Programming WCF Services

Written by Microsoft software legend Juval Lowy, Programming WCF Services is the authoritative introduction to Microsoft's new, and some say revolutionary, unified platform for developing service-oriented applications (SOA) on Windows. Relentlessly practical, the book delivers insight, not documentation, to teach developers what they...

Selecting MPLS VPN Services (Networking Technology)
Selecting MPLS VPN Services (Networking Technology)

A guide to using and defining MPLS VPN services

  • Analyze strengths and weaknesses of TDM and Layer 2 WAN services
  • Understand the primary business and technical issues when evaluating IP/MPLS VPN offerings
  • Describe the IP addressing, routing, load balancing,...
Programming Microsoft Outlook and Microsoft Exchange (Microsoft Programming)
Programming Microsoft Outlook and Microsoft Exchange (Microsoft Programming)
Programming Microsoft Outlook and Microsoft Exchange is a thorough guide for building collaborative applications such as threaded discussions and electronic business documents. Early on, the book describes four types of collaborative applications: messaging, tracking, workflow, and real-time applications. Author Thomas Rizzo shows the...
Creating your MySQL Database: Practical Design Tips and Techniques
Creating your MySQL Database: Practical Design Tips and Techniques
This book is an innovative and essential short guide for everyone on how to structure your data and set-up your MySQL database tables efficiently and easily. If you're creating a dynamic web application using open-source tools, then you're probably going to be setting up a MySQL database. Getting the design of this database right for your...
The Complete E-Commerce Book:Design, Build & Maintain a Successful Web-based Business
The Complete E-Commerce Book:Design, Build & Maintain a Successful Web-based Business

Showing how to build a successful e-commerce operation from the ground up, this text explores important considerations including customer experience, effective website design, cutting-edge programming, robust server configuration, and much more.

Make your e-commerce vision a success with this comprehensive, step-by-step handbook. Whether...

Windows Server Hacks
Windows Server Hacks
The tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT,...
ASP.NET in a Nutshell
ASP.NET in a Nutshell

As a quick reference and tutorial in one, ASP.NET in a Nutshell goes beyond the published documentation to highlight little-known details, stress practical uses for particular features, and provide real-world examples that show how features can be used in a working application. This book covers application and...

Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
BEA WebLogic Server 8.1 Unleashed
BEA WebLogic Server 8.1 Unleashed
BEA WebLogic Server Unleashed is the definitive reference work for the WebLogic developer, offering an in-depth look at the capabilities provided by WebLogic Server and illustrating the best development practices. The book covers WebLogic's role in every aspect of a J2EE application: from working with Servlets,...
Red Hat Linux Fedora 3 Unleashed
Red Hat Linux Fedora 3 Unleashed
Keeping with the tradition of offering the best and most comprehensive coverage of Red Hat Linux on the market, Red Hat Fedora 3 Unleashed includes new and additional materials based on the latest release of Red Hat's Fedora Core Linux distribution. Incorporating an advanced approach, the information presented aims...
Result Page: 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy