Home | Amazing | Today | Tags | Publishers | Years | Search 
Switching to the Mac: The Missing Manual, Leopard Edition
Switching to the Mac: The Missing Manual, Leopard Edition
Is Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac...
Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)
Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)
Virtual Machine technology applies the concept of virtualization to an entire machine, circumventing real machine compatibility constraints and hardware resource constraints to enable a higher degree of software portability and flexibility. Virtual machines are rapidly becoming an essential element in computer system design. They provide system...
Applications Interface Programming Using Multiple Languages: A Windows Programmer's Guide
Applications Interface Programming Using Multiple Languages: A Windows Programmer's Guide
Applications Interface Programming Using Multiple Languages is a comprehensive, hands-on, and practical guide to interface programming between multiple languages.

Today, as computer technology develops rapidly, a single programming language sometimes is not enough to handle complicated, real-world implementations. Each language has its...

Numerical Integration: on Advanced Computer Systems (Lecture Notes in Computer Science)
Numerical Integration: on Advanced Computer Systems (Lecture Notes in Computer Science)
This monograph is a comprehensive treatment of the theoretical and computational aspects of numerical integration.
The authors give a unique overview of the topic by bringing into line many recent research results not yet presented coherently; the extensive bibliography lists 268 items. Particular emphasis is given to the potential
...
Avid Liquid 7 for Windows: Visual QuickPro Guide
Avid Liquid 7 for Windows: Visual QuickPro Guide
"This best-selling reference's visual format and step-by-step, task-based instructions will have you up and running with this popular editing software in no time. In this completely updated edition of our best-selling guide to Avid Liquid (formerly known as Pinnacle Liquid), leading Avid evangelist and filmmaking consultant Paul Ekert uses...
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
The Sun™ ONE Messaging Server Practices and Techniques for Enterprise Customers book is published under the auspices of the Sun BluePrints™ program. This book is a collection of practices and techniques for deploying a messaging system. These practices and techniques have been gathered from many...
Lotus Notes Domino 8: Upgrader's Guide
Lotus Notes Domino 8: Upgrader's Guide
Written by senior architects and specialists of IBM Software Services for Lotus, this book for power users, administrators, and developers working with any version of Lotus Notes/Domino who want to upgrade is a complete guide to the most powerful new features and changes in Lotus Notes/Domino 8. It walks through the new features in the Lotus...
Core Servlets and Javaserver Pages: Advanced Technologies, Vol. 2 (2nd Edition)
Core Servlets and Javaserver Pages: Advanced Technologies, Vol. 2 (2nd Edition)
Java EE is the technology of choice for e-commerce applications, interactive Web sites, and Web-enabled services. Servlet and JSP technology provides the link between Web clients and server-side applications on this platform. Core Servlets and JavaServer Pages, Volume 2: Advanced Technologies, Second Edition, is the...
Reverse Engineering Code with IDA Pro
Reverse Engineering Code with IDA Pro

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...

RFID Applied
RFID Applied
Everything you need to know to implement and fully leverage RFID technology

RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.

...
OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
MySQL in a Nutshell
MySQL in a Nutshell
When you need to find the right SQL keyword or MySQL client command-line option right away, turn to this convenient reference, known for the same speed and flexibility as the system it covers so thoroughly. MySQL is packed with so many capabilities that the odds of remembering a particular function or statement at the right moment are pretty slim....
Result Page: 689 688 687 686 685 684 683 682 681 680 679 678 677 676 675 674 673 672 671 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy