Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools
Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools
Virtual collaborative team environments face unique challenges because their communication is not face-to-face. Managing Virtual Teams: Getting the Most from Wikis, Blogs, and Other Collaborative Tools provides practical advice for managers of distributed teams who must design the internal systems and meet deadlines with a diverse team, and for...
Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)
Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)
Algebraic Geometry and Geometric Modeling are two distinct domains of research, with few interactions up to now, though closely linked. On the one hand, Algebraic Geometry has developed an impressive theory targeting the understanding of geometric objects defined algebraically. On the other hand, Geometric Modeling is using every day, in practical...
Advanced Topics in Global Information Management, Vol. 2
Advanced Topics in Global Information Management, Vol. 2
Advanced Topics in Global Information Management includes original material concerned with all aspects of global information management in three areas: Global Information Systems in Business Functions, Information Technology in Specific Regions of the World, and Management of Global Information Resources and Applications. The focus of volume two is...
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Using Samba
Using Samba
Samba, the Server Message Block (SMB) server software that makes it relatively easy to integrate Unix or Linux servers into networks of Microsoft Windows workstations, has to date been mostly explained as an afterthought. Most often, it's appeared in the latter chapters of books about Linux. It deserves better, and the authors of Using...
Active Networks and Active Network Management: A Proactive Management Framework
Active Networks and Active Network Management: A Proactive Management Framework
Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very...
Python Data Visualization Cookbook
Python Data Visualization Cookbook

As a developer with knowledge of Python you are already in a great position to start using data visualization. This superb cookbook shows you how in plain language and practical recipes, culminating with 3D animations.

Overview

  • Learn how to set up an optimal Python environment for data visualization
  • ...
Automating Microsoft Azure Infrastructure Services: From the Data Center to the Cloud with PowerShell
Automating Microsoft Azure Infrastructure Services: From the Data Center to the Cloud with PowerShell

Get valuable tips and techniques for automating your cloud deployments with Azure PowerShell cmdlets, and learn how to provision Azure services on the fly. In this hands-on guide, Microsoft cloud technology expert Michael Washam shows you how to automate various management tasks and deploy solutions that are both complex and at...

Mobile Radio Networks: Networking and Protocols
Mobile Radio Networks: Networking and Protocols
The continuing growth of the Global System for Mobile Communications (GSM) based mobile telephones has brought with it increasingly rapid growth in interest in mobile communications interconnect problems and standards. For the rapid proliferation of mobile communications to be sustained without overloading the system, harmonization of the networks...
Information Visualization: Beyond the Horizon
Information Visualization: Beyond the Horizon

Information visualization is not only about creating graphical displays of complex and latent information structures; it contributes to a broader range of cognitive, social, and collaborative activities. This is the first book to examine information visualization from this perspective.

This 2nd edition continues the unique and ambitious...

Operating System Concepts
Operating System Concepts
Operating systems are large and complex, and yet must function with near-absolute reliability--that's why they're a class unto themselves in the field of software development. Since its first release 20 years ago, "the dinosaur book"--Operating System Concepts by Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne--has...
unlimited object storage image
Result Page: 104 103 102 101 100 99 98 97 96 95 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy