Home | Amazing | Today | Tags | Publishers | Years | Search 
Deploying with JRuby: Deliver Scalable Web Apps using the JVM (Pragmatic Programmers)
Deploying with JRuby: Deliver Scalable Web Apps using the JVM (Pragmatic Programmers)
Your website has just crashed, and you’re losing money. The application is built on Rails, runs on MRI, and is served up with Mongrel and Apache. Having this kind of infrastructure means that you’re managing more processes than you can count on two hands.

The background jobs are run
...
Photoshop® in Architectural Graphics
Photoshop® in Architectural Graphics

Photoshop® by Adobe Systems Inc. is the global market leader among image-processing applications.

Besides the “classical” fields of application in photography, graphics and web design, it plays an important role in 3-D modelling, both in the creation of textures and in the post-production of rendered...

Maya Studio Projects Texturing and Lighting (Wiley Desktop Editions)
Maya Studio Projects Texturing and Lighting (Wiley Desktop Editions)
“Half of good lighting╇ is good texturing, and half of good texturing is good lighting” is my favorite sage advice to new animators. It’s difficult to separate the two areas of computer animation. Texturing—the re-creation of specific surface qualities through the application of shaders,...
CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Moodle 2 Administration
Moodle 2 Administration
Moodle has evolved from an academic project to the world's most popular Virtual Learning Environment (VLE). During this evolution, its complexity has risen dramatically and so have the skills that are required to administer the system.

Moodle 2 Administration is a complete, practical guide for administering Moodle
...
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...

Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Pervasive Collaborative Networks: IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES
Pervasive Collaborative Networks: IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES
In earlier definitions, organization’s competency is mainly addressing its capabilities, for example Gallon (Gallon et al, 1995) defines competency as “aggregation of capabilities, where synergy that is created has sustainable value and broad applicability”. However participation of VBE members in general VBE...
Pro Tools 9 Ignite!: The Visual Guide for New Users (Book & CD)
Pro Tools 9 Ignite!: The Visual Guide for New Users (Book & CD)
First of all, congratulations on becoming a Pro Tools user, and welcome (or welcome back, if you’re an existing Pro Tools user)! When Digidesign says its powerful digital audio workstation (DAW) is the industry standard, you can believe it. Indeed, you’ll find Pro Tools, from the modest Mbox all the way up to high-end...
OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
.NET 4.0 Generics Beginner's Guide
.NET 4.0 Generics Beginner's Guide
It is my pleasure to write the foreword to a book which will introduce you to the world of generic programming with C# and other .NET languages. You will be able to learn a lot from this book, as it introduces you to the elegant power of generic programming in C#. Through it, you will become a better C# programmer, and a better programmer in...
Mobile and Wireless Network Security and Privacy
Mobile and Wireless Network Security and Privacy

Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. Major security and privacy issues for standard wireless networks include the authentication of wireless clients and...

Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy