Home | Amazing | Today | Tags | Publishers | Years | Search 
End-to-End Quality of Service Over Heterogeneous Networks
End-to-End Quality of Service Over Heterogeneous Networks
The book presents mechanisms, protocols, and system architectures to achieve end-to-end Quality-of-Service (QoS) over heterogeneous wired/wireless networks in the Internet. Particular focus is on measurement techniques, traffic engineering mechanisms and protocols, signalling protocols as well as transport protocol extensions to support fairness...
iPhone: The Missing Manual: Covers the iPhone 3G
iPhone: The Missing Manual: Covers the iPhone 3G

In the first year of the iPhone’s existence, Apple sold 6 million of them; brought the thing to 70 countries; and inspired an industry of misbegotten iPhone lookalikes from other companies. By the end of Year One, you could type iPhone into Google and get 229 million hits.

Now there’s a new iPhone, the iPhone 3G.
...

High Performance MySQL: Optimization, Backups, Replication, and More
High Performance MySQL: Optimization, Backups, Replication, and More
High Performance MySQL is the definitive guide to building fast, reliable systems with MySQL. Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity. High Performance MySQL teaches you advanced...
Wikipedia: The Missing Manual
Wikipedia: The Missing Manual
What made you write the book? In November 2006 I started working on an index for editors of Wikipedia – a single page that had links to all relevant policies, guidelines, how-to pages, reference pages, tools, and other things that an editor might conceivably want to read. The more I worked on the index, the...
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.

As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration...

Search Engine Optimization: An Hour a Day
Search Engine Optimization: An Hour a Day
Influence search engine results and bring targeted traffic to your website in just an hour day with the second edition of this bestselling SEO guide, Search Engine Optimization: An Hour a Day. Drawing on years of experience as successful SEO consultants, Jennifer Grappone and Gradiva Couzin provide detailed, practical, and often...
Aeronautical Radio Com Systems and Networks
Aeronautical Radio Com Systems and Networks
Typically, there are over twenty radio systems on board the average commercial jet aircraft dealing with communication, navigation and surveillance functions. Very high frequency (VHF) air-to-ground communication is usually the main method of  information and control exchange between pilot and air traffic control. Satellite and high frequency...
Advanced Web Metrics with Google Analytics
Advanced Web Metrics with Google Analytics

How Does Your Website Measure Up?

Are you getting the most out of your website? Google insider and web metrics expert Brian Clifton reveals the information you need to get a true picture of your site's impact and stay competitive using Google Analytics (GA) and the latest web metrics methodologies.

...

Control Techniques for Complex Networks
Control Techniques for Complex Networks
A representative of a major publishing house is on her way home from a conference in Singapore, excited about the possibility of a new book series. On the flight home to New York she opens her blackberry organizer, adding names of new contacts, and is disappointed to realize she may have caught the bug that was bothering her friend Alex at the...
Dungeons & Dragons  Dummies
Dungeons & Dragons Dummies
Caught in traffic. Trapped in a cubicle. Stuck in a rut.  Tangled up in red tape.

In the real world, sometimes you feel powerless—but not in Dungeons & Dragons (D & D). In this fantasy-adventure, you have all kinds of special powers. You can slay the evil dragon, overcome the orc or the ogre, haunt the...

Cyber Crime Investigator's Field Guide, Second Edition
Cyber Crime Investigator's Field Guide, Second Edition
In the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we...
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy