Home | Amazing | Today | Tags | Publishers | Years | Search 
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Embedded Multiprocessors: Scheduling and Synchronization (Signal Processing)
Embedded Multiprocessors: Scheduling and Synchronization (Signal Processing)
From the Foreword. . . . . .The intellectual content in this book is high. While some of the methods it describes are relatively simple, most are quite sophisticated. Yet examples are given that concretely demonstrate how these concepts can be applied in practical hardware architectures. Moreover, there is very little overlap with other books on...
mental ray for Maya, 3ds Max, and XSI: A 3D Artist's Guide to Rendering
mental ray for Maya, 3ds Max, and XSI: A 3D Artist's Guide to Rendering
Render them speechless with this in-depth guide to mental ray

Turn 3D models into film-worthy digital animations by mastering mental ray rendering once and for all. This must-have guide is the only book on the market to focus exclusively on mental ray in Maya, 3ds Max, and XSI, and it's packed with techniques and insights...

Advances in Database Technology - EDBT 2004
Advances in Database Technology - EDBT 2004
This book constitutes the refereed proceedings of the 9th International Conference on Extending Database Technology, EDBT 2004, held in Heraklion, Crete, Greece, in March 2004.

The 42 revised full papers presented together with 2 industrial application papers, 15 software demos, and 3 invited contributions were carefully reviewed and selected...

Professional IIS 7 and ASP.NET Integrated Programming
Professional IIS 7 and ASP.NET Integrated Programming
The deep integration of IIS 7 and ASP.NET provides both IIS 7 administrators and ASP.NET developers with new and exciting programming tools, techniques, and approaches that were not possible with earlier versions of IIS. With this book, Dr. Shahram Khosravi presents you with the only resource to focus exclusively on the key features of this...
FreeBSD Unleashed (With CD-ROM)
FreeBSD Unleashed (With CD-ROM)
Did you know that the special effects used in The Matrix were rendered using the FreeBSD system? Yahoo and the Internet Movie Database are also powered by FreeBSD. Now you can learn how to use FreeBSD to its full potential as well! FreeBSD Unleashed is a complete reference guide for FreeBSD administrators, developers, webmasters...
Professional Wikis (Programmer to Programmer)
Professional Wikis (Programmer to Programmer)

The success of Wikipedia has proven just how effective wikis can be for collaborative editing on a large scale—larger than anyone originally thought possible. This book shows you how to install, use, manage, and extend a wiki using MediaWiki—the wiki engine used to power Wikipedia.

As each chapter builds on previous...

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Creating Web-based Laboratories (Advanced Information and Knowledge Processing)
Creating Web-based Laboratories (Advanced Information and Knowledge Processing)
Remote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video camera & microphone before the equipment and apparatus to capture what is actually happening in the...
Guide to the Unified Process Featuring UML, Java and Design Patterns
Guide to the Unified Process Featuring UML, Java and Design Patterns
The UML, or Unified Modeling Language, is the de facto standard adopted by the Object Management Group (OMG) and by almost all vendors of object modeling tools. The Unified Process is explicitly designed to work with the UML and is a whole design method covering the majority of the life cycle of a software product. John Hunt's book guides you...
Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web. First Edition
Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web. First Edition
Ontologies provide a common vocabulary of an area and define - with different levels of formality - the meaning of the terms and the relationships between them. Ontologies may be reused and shared across applications and groups Concepts in the ontology are usually organized in taxonomies and relations between concepts, properties of concepts, and...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Result Page: 699 698 697 696 695 694 693 692 691 690 689 688 687 686 685 684 683 682 681 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy