Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
In Distributed Algorithms, Nancy Lynch provides a blueprint for designing, implementing, and analyzing distributed algorithms. She directs her book at a wide audience, including students, programmers, system designers, and researchers.

Distributed Algorithms
contains the most significant algorithms and impossibility
...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Design of Experiments in Chemical Engineering: A Practical Guide
Design of Experiments in Chemical Engineering: A Practical Guide

While existing books related to DOE are focused either on process or mixture factors or analyze specific tools from DOE science, this text is structured both horizontally and vertically, covering the three most common objectives of any experimental research:

  • screening designs
  • mathematical modeling, and...
The Verilog® Hardware Description Language
The Verilog® Hardware Description Language

The Verilog language is a hardware description language that provides a means of specifying a digital system at a wide range of levels of abstraction. The language supports the early conceptual stages of design with its behavioral level of abstraction, and the later implementation stages with its structural abstractions. The language includes...

Windows Small Business Server 2011 Administrator's Companion
Windows Small Business Server 2011 Administrator's Companion

If you run a small business, you don’t need us to tell you that the highly competitive marketplace, unpredictable economic cycles, time pressures, and technological demands are constantly exerting pressure on your bottom line.

Your business needs the same technologies that large companies do. You need the...

IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
Moodle 2 Administration
Moodle 2 Administration
Moodle has evolved from an academic project to the world's most popular Virtual Learning Environment (VLE). During this evolution, its complexity has risen dramatically and so have the skills that are required to administer the system.

Moodle 2 Administration is a complete, practical guide for administering Moodle
...
Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends
Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends
Current and future mobile terminals become increasingly complex because they have to deal with a variety of frequency bands and communication standards. Achieving multi-band/multi-mode functionality is especially challenging for the radio frequency (RF)-transceiver section, due to limitations in terms of frequency-agile RF components...
Monitoring Exchange Server 2007 with System Center Operations Manager
Monitoring Exchange Server 2007 with System Center Operations Manager

System Center Operations Manager 2007 is the new version of Microsoft Operations Manager 2005 and offers valuable new advantages for improving the manageability of Microsoft servers and applications. With this book, you’ll get high-level instruction for using Microsoft’s powerful server administration tool to manage Exchange...

unlimited object storage image
Result Page: 619 618 617 616 615 614 613 612 611 610 609 608 607 606 605 604 603 602 601 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy