Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
This redbook will help you install, tailor and configure the SuSE Linux 7.0 distribution on different servers of the xSeries and Netfinity class. You will be instructed on how to do the basic installation, and installing and configuring different services such as Apache (http-Server), Samba (Fileserver for Windows-based networks), and Postfix (an...
Advanced Java 2 Platform: How to Program (With CD-ROM)
Advanced Java 2 Platform: How to Program (With CD-ROM)
The authoritative DEITEL LIVE-CODE guide to programming with the Java 2 Enterprise (J2SE), Standard (J2SE) and Micro (J2ME) Editions

Java has revolutionized application and enterprise-systems...

Ajax and REST Recipes: A Problem-Solution Approach
Ajax and REST Recipes: A Problem-Solution Approach

Ajax and REST Recipes: A Problem-Solution Approach will serve all of your Ajax needs, by providing adaptable solutions for common tasks you'll want to implement on web sites using the next generation of Ajax and REST techniques. As a JavaScript developer, your time is precious, so you'll want to solve problems that present themselves in...

Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular...
Pro NetBeans IDE 5.5 Enterprise Edition
Pro NetBeans IDE 5.5 Enterprise Edition
Written for Java™ developers of varying skill and familiarity with the open source NetBeans™ IDE as well as Java IDEs in general, Pro NetBeans™ IDE 5.5 Enterprise Edition focuses on using NetBeans IDE as a professional Java EE 5 software development platform.

Experienced author Adam Myatt provides a comprehensive...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Advanced Rails
Advanced Rails
Ready to go to the next level with Rails? From examining the parts of Ruby that make this framework possible to deploying large Rails applications, Advanced Rails offers you an in-depth look at techniques for dealing with databases, security, performance, web services and much more. Chapters in this book help you understand not only the tricks and...
SEO Warrior
SEO Warrior

I was compelled to write SEO Warrior for many reasons. Every day, thousands of sites are born in the hopes of making it big. Most of them will fail before achieving their goals. Many site owners create their sites blindly, without conducting proper research. Many site owners do not even know what search engine optimization (SEO) is and what its...

Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...

Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets

Discover Today’s Newest, Best Paths to Sustainable Wealth

  • Master lower-cost, lower-risk ETF investing in tomorrow’s hottest growth areas: healthcare, infrastructure, and green technology
  • Profit from demographic change and other powerful global trends
  • Learn...
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

unlimited object storage image
Result Page: 392 391 390 389 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy