Home | Amazing | Today | Tags | Publishers | Years | Search 
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification

The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical...

Universe (Britannica Illustrated Science Library)
Universe (Britannica Illustrated Science Library)

There was a time when people believed that the stars were bonfires lit by other tribes in the sky, that the universe was a flat plate resting on the shell of a giant turtle, and that the Earth, according to the Greek astronomer Ptolemy, was at the center of the universe. From the most remote of times, people have been curious...

Taking Your iPad 2 to the Max
Taking Your iPad 2 to the Max

Oh, how far we’ve come.

As we progress into the second decade of the 21st century, it’s becoming increasingly obvious how the computers of the previous 30 years have begun to look not just old but archaic. The massive CRT monitors of the 1980s and 1990s have given way to pencil-thin displays of the 2000s. The...

Lights, Camera, Capture: Creative Lighting Techniques for Digital Photographers
Lights, Camera, Capture: Creative Lighting Techniques for Digital Photographers

Learn to achieve the best possible images with minimal lighting equipment

Author Bob Davis is a photographer whose high-profile clients include Oprah Winfrey and Eva Longoria, and whose work has appeared in Time, OMagazine, and People. Along with his invaluable professional advice, this beautiful...

Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Programming Windows Azure: Programming the Microsoft Cloud
Programming Windows Azure: Programming the Microsoft Cloud

I hate the term the cloud. I really do. In a surprisingly short period of time, I’ve seen the term twisted out of shape and become a marketing buzzword and applied to every bit of technology one can conjure up. I have no doubt that in a few years, the term the cloud will be relegated to the same giant dustbin for bad technology...

Real-Time Database Systems - Architecture and Techniques
Real-Time Database Systems - Architecture and Techniques

In recent years, tremendous research has been devoted to the design of database systems for real-time applications, called real-time database systems (RTDBS), where transactions are associated with deadlines on their completion times, and some of the data objects in the database are associated with temporal constraints on their validity....

haXe 2 Beginner's Guide
haXe 2 Beginner's Guide

Remember the olden days?

I vaguely remember this odd box called a computer gradually conquering corners of my living room and bedroom. Can you recall those times? We would "use a computer" for some specific tasks, such as writing a letter.

The term computer was quite popular back then. Now, the word is no...

Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)

Concurrent processes can exhibit extremely complicated behavior, and neither informal reasoning nor testing is reliable enough to establish their correctness. In this thesis, we develop a new technique for the verification of parallel programs. The technique is stated in terms of axioms and inference rules, and it is used to prove...

Discrete Mathematics for Computer Scientists
Discrete Mathematics for Computer Scientists

Many colleges and universities offer a course in discrete mathematics. Students taking these courses are from many disciplines, one of the largest being computer science. As a part of the Mathematics Across the Curriculum project at Dartmouth, supported by the National Science Foundation,1 we proposed to create a discrete mathematics...

Java For Dummies
Java For Dummies

Java is good stuff. I’ve been using it for years. I like Java because it’s very orderly. Almost everything follows simple rules. The rules can seem intimidating at times, but this book is here to help you figure them out. So, if you want to use Java and want an alternative to the traditional techie, softcover book, sit...

Vector Basic Training: A Systematic Creative Process for Building Precision Vector Artwork
Vector Basic Training: A Systematic Creative Process for Building Precision Vector Artwork

The one question I get asked most by other creatives is, “How do you get your vector artwork to look so nice?” When people ask me this, they’re not talking about any specific art project or illustration, but rather how I go about building my artwork in vector format so precisely.

Truth is that many...

Result Page: 125 124 123 122 121 120 119 118 117 116 115 114 113 112 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy