Home | Amazing | Today | Tags | Publishers | Years | Search 
The Works: Anatomy of a City
The Works: Anatomy of a City

How much do you really know about the systems that keep a city alive? The Works: Anatomy of a City contains everything you ever wanted to know about what makes New York City run. When you flick on your light switch the light goes on--how? When you put out your garbage, where does it go? When you flush your toilet, what happens to the...

Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
Regulation and the Evolution of the Global Telecommunications Industry
Regulation and the Evolution of the Global Telecommunications Industry

After decades of liberalization of the telecommunications industry around the world and technological convergence that allows for increasing competition, sector-specific regulation of telecommunications has been on the decline. As a result, the telecommunications industry stands in the middle of a debate that calls for either a total...

An Experimental Approach to CDMA and Interference Mitigation: From System Architecture to Hardware Testing through VLSI Design
An Experimental Approach to CDMA and Interference Mitigation: From System Architecture to Hardware Testing through VLSI Design

The key of a successful approach to the complex issue of designing wireless terminals for present and future communication systems (usually addressed to as '3rd Generation and beyond') lies in a single 'magic' word: multidisciplinarity. This was actually the philosophy which inspired and drove a fruitful teamwork performed at...

Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

Oracle E-Business Suite R12 Supply Chain Management
Oracle E-Business Suite R12 Supply Chain Management

This is a practical tutorial written in a clear and easy-to-understand style taking the reader through relevant, real-world examples that can be put into practice immediately. It contains detailed instructions and plenty of screenshots to make it easier for readers to understand Oracle E-Business Suite and work on it effectively. This book is...

Networking All-in-One For Dummies
Networking All-in-One For Dummies

The ultimate reference guide for network administrators

Network administrators now have a single, convenient place to turn for all the information they need. Networking All-in-One For Dummies, 4th Edition is like ten books in one, covering such topics as networking basics, network security, setting...

Erlang and OTP in Action
Erlang and OTP in Action

For a long time, the world of Erlang programming had only one book—The Book,1 released in 1993 and revised in 1996. Fanatics can still find it in print, at a price of over $100. A decade or so after its publication, The Book was getting long in the tooth, to say the least. The language had evolved to include several new and...

Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)
Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)

With all the fantastic Cisco documentation available online, why does the world of UCCE need this book? UCCE is such a big topic that it would be easy to think that it is possible to try and cover absolutely everything. Unfortunately, this would turn this book into nothing more than a product reference manual that could potentially be...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

ActiveMQ in Action
ActiveMQ in Action

To this day, enterprise message queuing is a concept that is not well understood by most software developers. Commercial message-oriented middleware (MOM) did not help to encourage adoption of the process; most of the MOMs on the market were closed source, were costly to buy and support, and required trained system administrators for...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy