Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Internet and Its Protocols: A Comparative Approach (The Morgan Kaufmann Series in Networking)
The Internet and Its Protocols: A Comparative Approach (The Morgan Kaufmann Series in Networking)
"Not only is this book thorough in covering the networking technologies and the applications of todays communications networks, it also guides you to comprehensive understanding of problems and solutions. This should be mandatory reading for every professional in our business."
--Loa Andersson, TLA-group, IETF MPLS working group
...
101 Ways to Promote Your Web Site: Filled with Proven Internet Marketing Tips, Tools, Techniques, and Resources to Increase Your Web Site Traffic
101 Ways to Promote Your Web Site: Filled with Proven Internet Marketing Tips, Tools, Techniques, and Resources to Increase Your Web Site Traffic
The key to a web site’s success is its ability to entice surfers to stop at that site, absorb what it offers, and return at a later date. This guide provides tools such as templates, checklists, and forms as well as proven techniques such as using e-mail, links, and online advertising to increase the number of initial users and repeat...
Programming Windows Azure: Programming the Microsoft Cloud
Programming Windows Azure: Programming the Microsoft Cloud

I hate the term the cloud. I really do. In a surprisingly short period of time, I’ve seen the term twisted out of shape and become a marketing buzzword and applied to every bit of technology one can conjure up. I have no doubt that in a few years, the term the cloud will be relegated to the same giant dustbin for bad technology...

Topology Control in Wireless Sensor Networks: with a companion simulation tool for teaching and research
Topology Control in Wireless Sensor Networks: with a companion simulation tool for teaching and research
The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life applications. It is common to see how this technology is being applied in irrigation systems, intelligent buildings, bridges, security mechanisms,...
Magento Search Engine Optimization
Magento Search Engine Optimization

You've built a great online store and all you need now are customers. This is where this invaluable tutorial comes in. Specifically written for Magento users, it uncovers the deep secrets of successful Search Engine Optimization.

Overview

  • Optimize your store for search engines in other countries and...
Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Learning Pentesting for Android Devices
Learning Pentesting for Android Devices

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...

Chemokine Biology - Basic Research and Clinical Application: Vol. 1: Immunobiology of Chemokines (Progress in Inflammation Research)
Chemokine Biology - Basic Research and Clinical Application: Vol. 1: Immunobiology of Chemokines (Progress in Inflammation Research)

Chemokines play an important role in recruiting inflammatory cells into tissues in response to infection and inflammation. They also play an important role in coordinating the movement of T-cells, B-cells and dentritic cells, necessary to generate an immune response (response to injury, allergens, antigens, invading microorganisms). They...

Networks-on-Chips: Theory and Practice (Embedded Multi-core Systems)
Networks-on-Chips: Theory and Practice (Embedded Multi-core Systems)

This book addresses many challenging topics related to the NoC research area. It starts by studying 3D NoC architectures and progresses to a discussion of NoC resource allocation, processor traffic modeling, and formal verification. NoC protocols are examined at different layers of abstraction. Also, several emerging research issues in NoC...

Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

Scalable Network Monitoring in High Speed Networks
Scalable Network Monitoring in High Speed Networks

Network monitoring serves as basis for a wide scope of network operations, engineering and management. Precise network monitoring involves inspecting every packet traversing in a network. However, this is infeasible in today’s and future high-speed networks, due to significant overheads of processing, storing, and transferring...

Tricks of the eBay Masters (2nd Edition)
Tricks of the eBay Masters (2nd Edition)
Take the mystery out of eBay and the enviable PowerSellers. Tricks of the eBay Masters, Second Edition is full of advice and over 600 tricks from expert eBay users. They learned by doing and are now going to pass on their wisdom to you. Find out how to jazz up your auction listings with HTML, how to increase buyer traffic through key...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy