Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Web 2.0 Architectures: What entrepreneurs and information architects need to know
Web 2.0 Architectures: What entrepreneurs and information architects need to know

Web 2.0 is more pervasive than ever, with business analysts and technologists struggling to comprehend the opportunity it represents. But what exactly is Web 2.0 -- a marketing term or technical reality? This fascinating book finally puts substance behind the phenomenon by identifying the core patterns of Web 2.0, and by introducing an...

Communications Satellites: Global Change Agents (Telecommunications Series)
Communications Satellites: Global Change Agents (Telecommunications Series)

Over the past 40 years, satellites have played a key role in creating a global culture, spreading worldwide entertainment, stimulating technological interchange, and promoting trade around the world. Communications Satellites: Global Change Agents addresses communications satellites not only in terms of the technology and the services...

Operating Systems In Depth: Design and Programming
Operating Systems In Depth: Design and Programming

The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), fi le systems, and security. However, I also cover issues that come up...

Computer Methods for Analysis of Mixed-Mode Switching Circuits
Computer Methods for Analysis of Mixed-Mode Switching Circuits

Mixed-mode switching circuits distinguish themselves from other circuits by including switches that are either clocked externally or controlled internally. These circuits have found broad applications in telecommunication networks, instrumentation, and power electronic systems, to name a few. It is the emergence of switched capacitor...

Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems

Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions...

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Beginning Perl
Beginning Perl
That was the subtitle for this book that was sadly, but wisely, rejected. However, it conveys two things about this book that I’ve tried to focus on: getting a job and having fun while learning the skills you need. Well, as much fun as you can reasonably have while learning how to program. Although many books aren’t...
Thermodynamics of Biochemical Reactions
Thermodynamics of Biochemical Reactions
This book is about the thermodynamics of enzyme-catalyzed reactions that make up the metabolism of living organisms. It is not an introductory text, but the fundamental principles of thermodynamics are reviewed. The reader does need some background in thermodynamics, such as that provided by a first course in physical...
The Inferior Colliculus
The Inferior Colliculus
The purpose of this volume is twofold. First, it offers an in-depth analysis of current approaches and issues in the study of the auditory system. By concentrating on one structure, the inferior colliculus, a focused and coherent treatment of many aspects of auditory neural processing is possible. The position of the inferior...
Making Things Move DIY Mechanisms for Inventors, Hobbyists, and Artists
Making Things Move DIY Mechanisms for Inventors, Hobbyists, and Artists

A unique guide to practical mechanical design principles and their applications
In Making Things Move, you'll learn how to build moving mechanisms through non-technical explanations, examples, and do-it-yourself projects--from art installations to toys to labor-saving devices. The projects include a drawing machine,
...

unlimited object storage image
Result Page: 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy