Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

PCI-X System Architecture
PCI-X System Architecture

The PCI-X bus will start appearing in advanced PCs within months, delivering breakthrough performance, transfer rates of up to 1.06 Gb/sec, and backward compatibility with the PCI standard. Now, there's a comprehensive guide to PCI-X, covering everything engineers and developers need to create robust, reliable PCI-X boards and software....

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Wireshark® 101: Essential Skills for Network Analysis
Wireshark® 101: Essential Skills for Network Analysis

This book is written for beginner analysts and includes 46 step-by-step labs to walk you through many of the essential skills contained herein. This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a...

Hardening Azure Applications
Hardening Azure Applications

Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform.

This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability...

HTTP: The Definitive Guide
HTTP: The Definitive Guide
Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.

While the basics of HTTP are elegantly
...
Web Metrics: Proven Methods for Measuring Web Site Success
Web Metrics: Proven Methods for Measuring Web Site Success
There now exists a wealth of tools and techniques that can determine if and how a Web site is providing business value to its owners. This book is a survey of those metrics and is as important to IT executives as it is to marketing professionals.
  • Jim Sterne is recognized worldwide as a leading Internet business expert and is the...
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
Increase Your Web Traffic in a Weekend
Increase Your Web Traffic in a Weekend

These days, everyone seems to have a home page or a Web site. However, just because you create and publish a Web site doesn't mean anyone will visit it. Competition to attract visitors is extreme. The reality is that of the millions of Web pages out there, only a handful actually attract a steady readership; and these same Web pages are...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Fatal Exit: The Automotive Black Box Debate
Fatal Exit: The Automotive Black Box Debate
A compelling argument for automotive technologies that speak for the victim, tell the truth, and could save millions of lives

Fatal Exit: The Automotive Black Box Debate cuts through thirty years of political wrangling and institutional biases to provide an argument for the Motor Vehicle Event Data Recorder (MVEDR). This automotive equivalent...

Introduction to ATM/IP Design and Performance with Applications Analysis Software
Introduction to ATM/IP Design and Performance with Applications Analysis Software
Many engineers and students experience difficulty in making sense of issues associated with IP and ATM teletraffic techniques. This is partly because of the subject itself: networks are flexible, complicated, and still evolving. However, some of the difficulties arise because of the advanced mathematical methods that have been applied to provide...
unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy