Home | Amazing | Today | Tags | Publishers | Years | Search 
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

Microsoft Access 2010 VBA Macro Programming
Microsoft Access 2010 VBA Macro Programming

Database macro programming has changed enormously over the last 15 years, having gone from Access Basic macros to VBA. Another major change occurred with Office 95, when macros went to VBA modules in a separate environment accessed via the Visual Basic Editor. It used to be fairly basic: code was entered into a special design window....

Applied Interval Analysis
Applied Interval Analysis

This book is about guaranteed numerical methods based on interval analysis for approximating sets, and about the application of these methods to vast classes of engineering problems. Guaranteed means here that inner and outer approximations of the sets of interest are obtained, which can be made as precise as desired, at the cost of...

Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Computability Theory: An Introduction to Recursion Theory
Computability Theory: An Introduction to Recursion Theory

The study of the class of computable partial functions (i.e., recursive partial functions) stands at the intersection of three fields: mathematics, theoretical computer science, and philosophy.

Mathematically, computability theory originates from the concept of an algorithm. It leads to a classification of functions according...

Computer Algebra: Symbolic and Algebraic Computation (Computing Supplementa)
Computer Algebra: Symbolic and Algebraic Computation (Computing Supplementa)

The journal Computing has established a series of supplement volumes the fourth of which appears this year. Its purpose is to provide a coherent presentation of a new topic in a single volume. The previous subjects were Computer Arithmetic 1977, Fundamentals of Numerical Computation 1980, and Parallel Processes and Related Automata...

Understanding Voice Over IP Technology
Understanding Voice Over IP Technology

The technology of voice over IP provides for making telephone calls over data networks such as the Internet and it has now reached critical mass. I know this because as a technology instructor I spend more and more time teaching Voice over IP or “VoIP.” I wrote this book because I couldn’t find any material suitable...

The HCS12 / 9S12: An Introduction to Software and Hardware Interfacing
The HCS12 / 9S12: An Introduction to Software and Hardware Interfacing

The Freescale HCS12 (also known as 9S12) microcontroller family was initially designed for automotive applications. The design of the HCS12 combines most features common in major 8-bit and 16-bit microcontrollers.

1. Full-feature timer system. The HCS12 timer system provides input-capture, outputcompare, pulse-width...

Representation and Inference for Natural Language: A First Course in Computational Semantics
Representation and Inference for Natural Language: A First Course in Computational Semantics

This book developed out of courses on computational semantics that the authors jointly taught at the Department of Computational Linguistics, University of the Saarland, Saarbrucken, Germany, in 1995 and 1998, and at ESSLLI'97, the 9th European Summer School in Logic, Language and Information, Aix-en-Provence, France, in...

VMware vSphere 5 Clustering Technical Deepdive
VMware vSphere 5 Clustering Technical Deepdive

** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...

haXe 2 Beginner's Guide
haXe 2 Beginner's Guide

Remember the olden days?

I vaguely remember this odd box called a computer gradually conquering corners of my living room and bedroom. Can you recall those times? We would "use a computer" for some specific tasks, such as writing a letter.

The term computer was quite popular back then. Now, the word is no...

Programmable Logic Controllers
Programmable Logic Controllers

Programmable logic controllers (PLCs) continue to evolve as new technologies are added to their capabilities. The PLC started out as a replacement for hardwired relay control systems. Gradually, various math and logic manipulation functions were added. Today PLCs are the controller of choice for the vast majority of automated...

Result Page: 753 752 751 750 749 748 747 746 745 744 743 742 741 740 739 738 737 736 735 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy