Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Computers, Volume 61: Architectural Issues
Advances in Computers, Volume 61: Architectural Issues
Emphasizes architectural issues in the design of new hardware and software system.

The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computer science, with many citations, and often include new developments in the field by the authors of the individual
...
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL
This second handbook represents the efforts of many individuals at XYPRO, who collectively have over 250 years of experience with the HP NonStop platform. In addition, we’ve been privileged to work with a group of contributors and expert reviewers from the HP NonStop Server user community. Their cooperation and experience added dimension to...
Beginning DB2: From Novice to Professional (Expert's Voice)
Beginning DB2: From Novice to Professional (Expert's Voice)
IBM’s DB2 Express Edition is one of the most capable of the free database platforms available in today’s marketplace. In Beginning DB2, author Grant Allen gets you started using DB2 Express Edition for web sites, desktop applications, and more. The author covers the basics of DB2 for developers and database...
Angular Momentum: An Illustrated Guide to Rotational Symmetries for Physical Systems
Angular Momentum: An Illustrated Guide to Rotational Symmetries for Physical Systems
If a physical system has only internal interactions and if space is isotropic, then intrinsic properties of the system must be independent of its orientation and must be indistinguishable in all directions. From this fundamental rotational symmetry concept the theory of angular momentum has been developed into a sophisticated analytical and...
Web-Based Learning: Men And Machines: Proceedings of the First International Conference on Web-Based Learning in China (ICWL 2002)
Web-Based Learning: Men And Machines: Proceedings of the First International Conference on Web-Based Learning in China (ICWL 2002)
Proceedings of the First Intl Conference on Web-Based Learning in China, held August 17-19, 2002 in Hong Kong. An up to date study of technical, pedagogical and managerial issues in Web-based learning. Softcover.

Nowadays, our society has entered into the information age, in which people intend to acquire the information as
...
RFID Technology and Applications
RFID Technology and Applications
This book is addressed to business management and project managers as well as researchers who are evaluating the use of radio frequency identification (RFID) for tracking uniquely identified objects. In an effort to make RFID project management less of an art form and more of a science RFID Technology and Applications brings together pioneering...
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Recent advancement and increased growth in Web technologies have resulted in an even greater need for more efficient scheduling and data transmission strategies. An increased reliance on wireless communications devices, with their constraint issues, has further complicated the problem. While both push and pull strategies provide certain solutions,...
Excel Basics to Blackbelt: An Accelerated Guide to Decision Support Designs
Excel Basics to Blackbelt: An Accelerated Guide to Decision Support Designs
Excel Basics to Blackbelt is intended to serve as an accelerated guide to decision support designs. Its structure is designed to enhance the skills in Excel of those who have never used it for anything but possibly storing phone numbers, enabling them to reach to a level of mastery that will allow them to develop user interfaces and automated...
Absolute Beginner's Guide to Keynote for Mac OS X
Absolute Beginner's Guide to Keynote for Mac OS X
Priced at $99, Keynote is the new application that promises to bring to everyone the ability to create stunning, professional-quality presentations. It includes professionally designed themes, top-end typography, animated charts and tables, and cinematic quality transitions. Keynote has Apple's traditional elegance and ease-of-use, with intuitive...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Audio Programming for Interactive Games
Audio Programming for Interactive Games
Martin Wilde explores the cutting-edge creative potential of game audio systems, addressing the latest working methods used in creating and programming immersive, interactive and non-linear audio for games. The book demonstrates how game programmers can create a software system enabling the audio content provider (composer or sound designer) to...
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
Result Page: 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy