 |
|
 Migrating Applications to IPv6
How badly will IPv6 break your application? What do you need to consider to make
your application “IPv6-ready”? What questions should you ask?
In the ideal world, your application should “just work” on IPv6, just as it does on IPv4.
However, in the real world, application issues crop up. These could be... |  |  |  |  Professional Plone 4 Development
I suspect Martin plied me to write this foreword while out one evening during the 2010 Plone Conference in Bristol. Full from an excellent dinner and even better conversation, beer in hand, who could say no?
I've long envied Martin's ability to write. Text and code flow from his fingers at a rate that I can't even begin... |
|
 C++ How to Program (8th Edition)
Welcome to the C++ computer programming language and C++ How to Program, Eighth
Edition! This book presents leading-edge computing technologies, and is particularly appropriate
for inroductory course sequences based on the curriculum recommendations of
two key professional organizations—the ACM and the IEEE.
The new... |  |  Fundamentals of Logic Design (with Companion CD-ROM)
After studying this text, you should be able to apply switching theory to the solution of
logic design problems.This means that you will learn both the basic theory of switching
circuits and how to apply it. After a brief introduction, you will study Boolean algebra,
which is the basic mathematical tool needed to analyze and synthesize... |  |  BGP
This is a book about connecting to the Internet as reliably as possible. This means
eliminating all single points of failure,including having just one Internet service provider
(ISP). By multihoming to two or more ISPs,you can remain connected when
either ISP (or your connection to them) experiences problems. However,there... |
|
|
 Approximation and Online Algorithms: 8th International Workshop, WAOA 2010
Networked systems for transport, communication, and social interaction have contributed to all aspects of life by increasing economic and social efficiency. However, increased connectivity also gives intruders and attackers better opportunities to maliciously spread in the network, whether the spread is of disinformation, or of contamination... |  |  21 Recipes for Mining Twitter
This intentionally terse recipe collection provides you with 21 easily adaptable Twitter mining recipes and is a spin-off of Mining the Social Web (O'Reilly), a more comprehensive work that covers a much larger cross-section of the social web and related analysis. Think of this ebook as the jetpack that you can strap onto that great... |  |  The Blues: A Very Short Introduction (Very Short Introductions)
Praised as "suave, soulful, ebullient" (Tom Waits) and "a meticulous researcher, a graceful writer, and a committed contrarian" (New York Times Book Review), Elijah Wald is one of the leading popular music critics of his generation. In The Blues, Wald surveys a genre at the heart of American culture. ... |
|
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 |