Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Logical Foundations for Rule-Based Systems (Studies in Computational Intelligence)
Logical Foundations for Rule-Based Systems (Studies in Computational Intelligence)

Thinking in terms of facts and rules is perhaps one of the most common ways of approaching problem definition and problem solving both in everyday life and under more formal circumstances. The best known set of rules, the Ten Commandments have been accompanying us since the times of Moses; the Decalogue proved to be simple but...

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Social Media for WordPress: Build Communities, Engage Members and Promote Your Site
Social Media for WordPress: Build Communities, Engage Members and Promote Your Site
The decision to write a book about this content management system was an easy one. At the time of this writing, WordPress powers more than 15 percent of all websites online. That's a considerable bite out of the Internet. Unfortunately, that also meant a lot of books had already been published on WordPress. After a couple of weeks, mulling...
Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results
Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results

Once you've got a web site up and running it is all too easy to sit back and relax. But how do you know you did a good job? How can you improve the site you have based on real user behaviour? Without getting feedback from your users, how will you find out how it's being used? Web traffic analysis allows you to gain some insight into...

Interdomain Multicast Routing: Practical Juniper Networks and Cisco Systems Solutions
Interdomain Multicast Routing: Practical Juniper Networks and Cisco Systems Solutions

Increasing numbers of ISPs have begun implementing multicast infrastructure. Soon the Internet will provide multicast connectivity between any two points on the Internet the way it provides for unicast traffic today. Long-evolving protocols are reaching maturity, and enterprise networks and ISPs around the world are ramping...

Frame Relay for High-Speed Networks
Frame Relay for High-Speed Networks
Emerging new applications for a mature technology. Frame relay has recently emerged as a popular interface choice for today's high-speed services, including videoconferencing, SNA networking, voice-over data, and high-speed Internet access itself. Stressing services rather than bits and bytes, this book reexamines this mature technology in light of...
iPhone For Dummies (Computer/Tech)
iPhone For Dummies (Computer/Tech)
The iPhone 3G is here! You’ll want to make the most of it, and iPhone For Dummies, 2nd Edition is ready to help. Master the multitouch interface, send text messages, enjoy rich-HTML e-mail, use GPS maps, and more, with this full-color guide to show you how!

Edward C. Baig and “Dr. Mac” Bob LeVitus, two giants of...

P2P Networking and Applications (Morgan Kaufmann Series in Networking)
P2P Networking and Applications (Morgan Kaufmann Series in Networking)
Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a...
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
Highly regarded as the book on the air interface of 3G cellular systems WCDMA for UMTS has again been fully revised and updated. The third edition now covers the key features of 3GPP Release 6 ensuring it remains the leading principal resource in this constantly progressing area.

By providing a deep understanding of the...

Content Distribution Networks: An Engineering Approach
Content Distribution Networks: An Engineering Approach
Content distribution networks (CDNs) are the most promising new techniques for coping with the huge and swiftly growing volume of Internet traffic. In essence, CDNs are groups of proxy-servers located at strategic points around the Internet and arranged so as to ensure that a download request can always be handled from the nearest server. In this,...
Search Engine Optimization (SEO): An Hour a Day
Search Engine Optimization (SEO): An Hour a Day

How is your website doing on the search engines? Need a little help? Well, you’re holding the right book in your hands. This book will walk you through the steps to achieve a targeted, compelling presence on the major search engines. There are no secrets or tricks here, just downto- earth, real-world advice and a clear program...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy