Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Java ME on Symbian OS: Inside the Smartphone Model (Symbian Press)
Java ME on Symbian OS: Inside the Smartphone Model (Symbian Press)
In Java ME on Symbian OS, the authors expose the opportunities for application developers wishing to use Java ME on Symbian OS.

Written by a team of experts from Symbian, Nokia and Sun Microsystems Java ME on Symbian OS reveals what can be found “under-the-hood” of the world’s leading smartphone...

Strained Hydrocarbons: Beyond the van't Hoff and Le Bel Hypothesis
Strained Hydrocarbons: Beyond the van't Hoff and Le Bel Hypothesis
In clearly structured chapters, this book covers the fascinating world of hydrocarbons, providing an insight into the fundamental principles of chemistry. The monograph covers modern aspects of the topic, such as carbon nanotubes, molecular flask inclusion, and fullerenes, with new synthetic procedures for the build up of the structural lattice...
The Adweek Copywriting Handbook: The Ultimate Guide to Writing Powerful Advertising and Marketing Copy from One of America's Top Copywriters
The Adweek Copywriting Handbook: The Ultimate Guide to Writing Powerful Advertising and Marketing Copy from One of America's Top Copywriters
Great copy is the heart and soul of the advertising business. In this practical guide, legendary copywriter Joe Sugarman provides proven guidelines and expert advice on what it takes to write copy that will entice, motivate, and move customers to buy. For anyone who wants to break into the business, this is the ultimate companion resource for...
Joomla! 1.5 SEO
Joomla! 1.5 SEO
Some sites always appear at the top of a search result while others fail to even make it to the top ten. Wouldn't you want to see your site on the first page of any search result? This is not easily feasible if you are depending solely on the marketing guys whom you hire for SEO.

Joomla! SEO will help you to attract more visitors and
...
Great Events From History: The 20th Century, 1941-1970
Great Events From History: The 20th Century, 1941-1970

This is a unique resource: Nothing is comparable with this much depth or numbers that covers so many 20th century events.??AAGreat Events from History: The Twentieth Century, 1941-1970??AA, is the ninth installment in Salem Press' ongoing ??AAGreat Events from History??AA series. This six-volume set contains 1,112 essays on more than 1,100...

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

The R Book
The R Book

R is a high-level language and an environment for data analysis and graphics. The design of R was heavily influenced by two existing languages: Becker, Chambers and Wilks’ S and Sussman’s Scheme. The resulting language is very similar in appearance to S, but the underlying implementation and semantics are derived from Scheme. This...

3D Art Essentials: The Fundamentals of 3D Modeling, Texturing, and Animation
3D Art Essentials: The Fundamentals of 3D Modeling, Texturing, and Animation

This book was written to give beginning 3D artists a map through the art and how to get involved in the 3D industry. You can use this book by reading all the way through it cover to cover with or without doing the tutorials, by picking and choosing chapters based on gaps you want to fill, or as a quick reference to a concept you...

802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
unlimited object storage image
Result Page: 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy