Home | Amazing | Today | Tags | Publishers | Years | Search 
Technologies for Home Networking
Technologies for Home Networking
A broad overview of the home networking field, ranging from wireless technologies to practical applications

In the future, it is expected that private networks (e.g., home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP-based services, and possibly becoming service providers...

XML and Java: Developing Web Applications
XML and Java: Developing Web Applications

XML and Java: Developing Web Applications is a tutorial that will teach Web developers, programmers, and system engineers how to create robust XML business applications for the Internet using the Java technology. The authors, a team of IBM XML experts, introduce the essentials of XML and Java development, from a review of basic concepts to...

Windows Server 2008 For Dummies (Computer/Tech)
Windows Server 2008 For Dummies (Computer/Tech)
If you’re curious, but hesitant, about finding your way around Microsoft’s new Windows Server 2008, Windows Server 2008 For Dummies is the book for you. This friendly reference shows you everything you need to know — from installation and deployment to building and running a Windows Server 2008 network.

...

Wireless Networking Handbook
Wireless Networking Handbook
Many organizations utilize traditional wire-based networking technologies to establish connections among computers. These technologies fall into the following three categories:

• Local area networks (LANs)
• Metropolitan area networks (MANs)
• Wide area networks (WANs)

LANs support the sharing of
...
Groovy Recipes: Greasing the Wheels of Java (Pragmatic Programmers)
Groovy Recipes: Greasing the Wheels of Java (Pragmatic Programmers)
Each recipe in Groovy Recipes begins with a concise code example for a quick start, followed by in-depth explanation in plain English. These recipes will get you to-to-speed in a Groovy environment quickly.

You'll see how to speed up nearly every aspect of the development process using Groovy. Groovy makes mundane file management...

Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Mobility has become increasingly important for both business and casual users of computing technology. With the widespread adoption of portable computing devices, such as laptops, PDAs, tablet computers, music players, and cell phones, people can have almost constant access to their personal data as well as to information that is shared with...
ASP .NET Kick Start
ASP .NET Kick Start

This is an introductory book on creating ASP.NET Web applications using Microsoft Visual Studio .NET. The focus of this book is the Visual Studio .NET development environment. You will learn how to take full advantage of the features of the Visual Studio .NET development environment to quickly develop professional Web...

Office and SharePoint 2007 User's Guide: Integrating SharePoint with Excel, Outlook, Access and Word (Expert's Voice)
Office and SharePoint 2007 User's Guide: Integrating SharePoint with Excel, Outlook, Access and Word (Expert's Voice)
Web sites. Collaboration. Document management. Paperless offices. We want it all in business today, but how do you achieve all of these goals? More importantly, if you work for one of the millions of small to medium–sized businesses, how do you find the time and build the expertise necessary to reach these goals? Even the most powerful tool...
Enterprise Java Development on a Budget: Leveraging Java Open Source Technologies
Enterprise Java Development on a Budget: Leveraging Java Open Source Technologies

TODAY THE JAVA 2 PLATFORM, Enterprise Edition (J2EE) is the most complete and effective platform for enterprise development. J2EE unifies and embodies the knowledge gained from building up-to-date, multitier applications, and provides this knowledge as a standardized set of modular components and services. We believe that J2EE simplifies many...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
XML Primer Plus
XML Primer Plus
Undoubtedly, you've heard of Extensible Markup Language, commonly known as XML. You may have even seen some of it, though you might not have been aware of it at the time. One thing's fairly certain, however: You'll be seeing a lot more of it in the future.

My certainty is based on the fact that XML is beginning to spread at a pace that
...
Handbook of Research on Wireless Security
Handbook of Research on Wireless Security
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to...
Result Page: 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy