Home | Amazing | Today | Tags | Publishers | Years | Search 
Data and Computer Communications (8th Edition)
Data and Computer Communications (8th Edition)

This book attempts to provide a unified overview of the broad field of data and computer communications. The organization of the book reflects an attempt to break this massive subject into comprehensible parts and to build, piece by piece, a survey of the state of the art.The book emphasizes basic...

Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)
Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)

One of the consequences of the information revolution is the ever-growing amount of
information we are surrounded with and the need to process this information
efficiently and extract meaningful knowledge. This phenomenon was termed “digital
obesity” or “information obesity” by Toshiba Ltd. One
...

Convergence of Mobile and Stationary Next-Generation Networks
Convergence of Mobile and Stationary Next-Generation Networks

The optical networking technology that suffered in the post - dot - com crash several years ago has since recovered and is once again poised for rapid growth due to the exhaustion of available bandwidth. Today, photonics networks transport Internet data over large distances in long - haul and metropolitan networks. Improvements in...

HTML5 & CSS3 For The Real World
HTML5 & CSS3 For The Real World

Welcome to HTML5 & CSS3 for the Real World. We’re glad you’ve decided to join us on this journey of discovering some of the latest and the greatest in front-end website building technology.

If you’ve picked up a copy of this book, it’s likely that you’ve dabbled to some degree in HTML and...

Audit and Trace Log Management: Consolidation and Analysis
Audit and Trace Log Management: Consolidation and Analysis

Audit and Trace Log Management: Consolidation and Analysis is both a timely and much needed compilation of useful information around a topic that is becoming more and more critical to not only IT professionals and security practitioners, but to many other departments, such as legal, risk, and compliance, as well as auditors and...

Microsoft Reference Architecture for Commerce Version 2.0 (Pro-Other)
Microsoft Reference Architecture for Commerce Version 2.0 (Pro-Other)

Welcome to the Developer’s Guide for the Microsoft® Reference Architecture for Commerce, version 2.0. The Microsoft Reference Architecture for Commerce consists of engineered code components that allow developers to build retail Web sites using the Microsoft® Windows® 2000 Server operating system and...

Scaling MongoDB
Scaling MongoDB

This text is for MongoDB users who are interested in sharding. It is a comprehensive look at how to set up and use a cluster.

This is not an introduction to MongoDB; I assume that you understand what a document, collection, and database are, how to read and write data, what an index is, and how and why to set up a...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Web and Wireless Geographical Information Systems: 10th International Symposium
Web and Wireless Geographical Information Systems: 10th International Symposium

Continuing advances in the development of wireless and Internet technologies generate ever increasing interest in the diffusion, usage, and processing of georeferenced data of all types. Spatially-aware wireless and Internet devices also offer new ways of accessing and analyzing geo-spatial information in both realworld and virtual spaces....

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

Logic for Programming, Artificial Intelligence, and Reasoning: 16th International Conference
Logic for Programming, Artificial Intelligence, and Reasoning: 16th International Conference

The 16th LPAR event was held in Africa for the very first time, signalling a bright future for a conference with a glowing history. For many years it was a goal of the steering committee to hold LPAR in Africa and the enthusiasm for our presence far exceeded our expectations. With the help of local organiser Waly Faye, LPAR integrated itself...

Result Page: 307 306 305 304 303 302 301 300 299 298 297 296 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy