Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Server 2008 TCP/IP Protocols and Services
Windows Server 2008 TCP/IP Protocols and Services
This book is a straightforward discussion of the concepts, principles, and processes of many protocols in the TCP/IP protocol suite and how they are supported by Windows Server 2008 and Windows Vista. The focus of this book is on Internet Protocol version 4 (IPv4), referred to as Internet Protocol (IP), and associated transport and network...
Microsoft Visual Studio 2008 Unleashed
Microsoft Visual Studio 2008 Unleashed
Microsoft® Visual Studio 2008 Unleashed is an end-to-end, deep dive into the Visual Studio development environment. It’s meant to provide you guidance on how you can squeeze the ultimate productivity out of the many features built into the .NET development tools. Understanding how to use your tools will make you a better...
Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications
Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications
"...excellent and interesting reading for digital signal processing engineers and designers and for postgraduate students in electrical and computer faculties." (Mathematical Reviews, 2002d)

Signal Analysis explores methods that offer an insight into the properties of signals and stochastic processes. This
...
Sams Teach Yourself SQL in 24 Hours (4th Edition)
Sams Teach Yourself SQL in 24 Hours (4th Edition)
In just 24 lessons of one hour or less, you will learn professional techniques to design and build efficient databases and query them to extract useful information. Using a straightforward, step-by-step approach, each lesson builds on the previous one, allowing you to learn the essentials of ANSI SQL from the ground up.
Deploying Rails Applications: A Step-by-Step Guide (Facets of Ruby)
Deploying Rails Applications: A Step-by-Step Guide (Facets of Ruby)
First you'll learn how to build out your shared, virtual, or dedicated host. Then, you'll see how to build your applications for production and deploy them with one step, every time. Deploying Rails Applications will take you from a simple shared host through a highly scalable clustered and balanced setup with Nginx.

See how to tell whether...

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Handbook on Information Technologies for Education and Training (International Handbooks on Information Systems)
Handbook on Information Technologies for Education and Training (International Handbooks on Information Systems)
"Part of the publishers series of International handbooks on information systems, this is a great fat book which does indeed concentrate on the technical side rather than on pedagogy. its concern is the design and implementation of hardware/software systems (including networks) for educational and training contexts. Its more than forty...
H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia
H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia

Following on from the successful MPEG-2 standard, MPEG-4 Visual is enabling a new wave of multimedia applications from Internet video streaming to mobile video conferencing. The new H.264 ‘Advanced Video Coding’ standard promises impressive compression performance and is gaining support from developers and manufacturers. The first...

Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Nessus Network Auditing, Second Edition
Nessus Network Auditing, Second Edition
In the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
...
Programming With Visibroker : A Developer's Guide to Visibroker for Java
Programming With Visibroker : A Developer's Guide to Visibroker for Java
Coauthored by the lead architect for the VisiBroker Java ORB, this is the authoritative guide to programming with VisiBroker for Java. Designed to help Java developers quickly master the skills they need to develop more powerful and sophisticated distributed, object-oriented, client/server systems from scratch or by combining existing...
Mastering VMware Infrastructure 3
Mastering VMware Infrastructure 3
Transform your IT infrastructure without extra hardware

Cut hardware costs, expand your capacity, and manage an entire fleet of virtual machines in your enterprise with the leading virtualization solution, VMware Infrastructure 3 (VI3), and the step-by-step instruction in this must-have guide. This essential book is packed...

Result Page: 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy