Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft IIS 7 Implementation and Administration (Mastering)
Microsoft IIS 7 Implementation and Administration (Mastering)
Make the move to IIS 7 with this practical guide

Microsoft's IIS 7 is a radical departure from previous versions of IIS, and it promises administrators a new level of control over their Web servers, with its modular design and a flexible, extensible architecture that creates new opportunities for customization. This book...

Pro Oracle Database 10g RAC on Linux: Installation, Administration, and Performance
Pro Oracle Database 10g RAC on Linux: Installation, Administration, and Performance
Real Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope with bigger workloads and more users. Many books limit themselves by conceptualizing and theorizing about RAC technology, but this book is the first to portray implementing and administering an Oracle 10g RAC system in...
Beginning Spring 2: From Novice to Professional
Beginning Spring 2: From Novice to Professional
Spring has made a remarkable rise since its conception in 2002. Users find Spring the ideal framework to build their applications in J2EE environments. Beginning Spring 2 is the first and only Spring-authorized book that takes you through the first steps of using Spring, and requires no prior J2EE experience. It discusses relevant...
Machine Learning in Document Analysis and Recognition (Studies in Computational Intelligence)
Machine Learning in Document Analysis and Recognition (Studies in Computational Intelligence)
The objective of Document Analysis and Recognition (DAR) is to recognize the text and graphical components of a document and to extract information. With first papers dating back to the 1960’s, DAR is a mature but still growing research field with consolidated and known techniques. Optical Character Recognition (OCR) engines are some of the...
Distributed Search by Constrained Agents: Algorithms, Performance, Communication
Distributed Search by Constrained Agents: Algorithms, Performance, Communication
Agent technology is evolving as a leading field of research connected to diverse areas such as A.I., E-commerce, robotics and information retrieval. Agents systems use reasoning and constraint-based reasoning that has a wide potential for representing multiple types of problems. A fundamental building block within all these areas is the ability to...
Semantics with Applications: An Appetizer (Undergraduate Topics in Computer Science)
Semantics with Applications: An Appetizer (Undergraduate Topics in Computer Science)
Semantics will have an important role to play in the future development of software systems and domain specific languages, and there is a real need for an introductory book that presents the fundamental ideas behind these approaches; stresses their relationship by formulating and proving the relevant theorems; and illustrates the applications of...
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
WiMAX / MobileFi: Advanced Research and Technology
WiMAX / MobileFi: Advanced Research and Technology
WiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group standardized most aspects of WiMAX signaling messages. However, several algorithms were left unspecified opening the door for innovations in protocol engineering for 802.16/802.20-based broadband...
Network Performance Analysis: Using the J Programming Language
Network Performance Analysis: Using the J Programming Language
The J programming laguage is rich in mathematical functionality and ideally suited to analytical computing methods. It is, however, a somewhat terse language and not entirely intuitive at first, particularly if one is used to more conventional programming languages such as C, Pascal or Java. J functions (called verbs) are denoted by punctuation...
Mac OS X Leopard: Beyond the Manual
Mac OS X Leopard: Beyond the Manual
Mac OS X is quickly becoming one of the most popular operating systems for power users. Mac OS X’s ability to mesh an easy-to-use and attractive interface with a Unix back end has attracted average and power users to the Mac. In 2007, Apple releases the next version of Mac OS X: Leopard.

Mac OS X Leopard: Beyond the Manual is...

Survey of Text Mining II: Clustering, Classification, and Retrieval
Survey of Text Mining II: Clustering, Classification, and Retrieval
The proliferation of digital computing devices and their use in communication has resulted in an increased demand for systems and algorithms capable of mining textual data. Thus, the development of techniques for mining unstructured, semi-structured, and fully-structured textual data has become increasingly important in both academia and industry....
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
Result Page: 790 789 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy