Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

Practical Ruby for System Administration (Expert's Voice in Open Source)
Practical Ruby for System Administration (Expert's Voice in Open Source)
Ruby has set the world on fire, proving itself a serious challenger to Perl and Python in all spheres. In particular, more and more people are discovering that Ruby's flexibility, superb feature set, and gentle learning curve make it a natural choice for system administration tasks, from the humblest server to the largest enterprise deployment....
A Guide to MATLAB Object-Oriented Programming
A Guide to MATLAB Object-Oriented Programming
I am an admitted object-oriented fanatic. I have been designing and implementing object-oriented software for more than twenty years. When I started designing and implementing object-oriented MATLAB®, I encountered many detractors. They would say things like “The object model isn’t complete,” “You can’t have public...
Posters: A Global History
Posters: A Global History
From band posters stapled to telephone poles to the advertisements hanging at bus shelters to the inspirational prints that adorn office walls, posters surround us everywhere―but do we know how they began? Telling the story of this ephemeral art form, Elizabeth E. Guffey reexamines the poster’s roots in the nineteenth century and...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
A Manager's Guide To PR Projects: A Practical Approach (LEA's Communication Series)
A Manager's Guide To PR Projects: A Practical Approach (LEA's Communication Series)
A Manager s Guide to PR Projects was conceived, gestated, and produced
out of sheer frustration. Perhaps a more academic approach to this explanation
would be to say that one university professor experienced considerable
difficulty in acquiring appropriate materials to support a pedagogical approach
involving student
...
Fast Track Visual C++(r) 6.0 Programming
Fast Track Visual C++(r) 6.0 Programming
Get up to speed with the latest version of Visual C++. What makes Fast Track the C++ guide of choice is leading expert Steve Holzner's practical approach to learning by example. Cutting right to the core of issues crucial to programmers, this book begins with a brief refresher course and then moves quickly onto the skills that really count:...
Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Object-Oriented Programming with Visual Basic .NET
Object-Oriented Programming with Visual Basic .NET

This book is not a reference. That needs to be said right off the bat. It was written to be read cover to cover; it tells a story. It's an interwoven tale about object-oriented programming in the .NET world: building objects, moving them, and using them around the world. This is not just a how-to book; it's a why-to and a when-to...

Formula One Racing for Dummies
Formula One Racing for Dummies
Formula One racing is the pinnacle of motor racing around the world. These days, the sport is a truly global circus. At almost every race on the calendar, more than 120,000 spectators cram into the grandstands and spectator banking, all vying for a view of the millionaire superstar drivers. At the same time, in 150 countries worldwide, more than...
Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy