Home | Amazing | Today | Tags | Publishers | Years | Search 
Performance of Computer Communication Systems: A Model-Based Approach
Performance of Computer Communication Systems: A Model-Based Approach
Performance of Computer Communication Systems A Model-Based Approach Boudewijn R. Haverkort Rheinisch-Westfälische Technische Hochschule Aachen, Germany Computer communication systems and distributed systems are now able to provide an increasing range of services. As the timing requirements in the operation of these services are becoming...
Textmate: Power Editing for the Mac (Pragmatic Programmers)
Textmate: Power Editing for the Mac (Pragmatic Programmers)
TextMate is a powerful tool for programmers, web designers, and anyone else who regularly needs to work with text files on Mac OS X. TextMate focuses on pragmatic automation, which means it will save you time time that's always in short supply. See how your lowly text editor can become a hard working member of your staff.

TextMate is a...

eBay the Smart Way: Selling, Buying, and Profiting on the Web's #1 Auction Site, Third Edition
eBay the Smart Way: Selling, Buying, and Profiting on the Web's #1 Auction Site, Third Edition
If ever a company could be described as the "800-pound gorilla" of its industry, eBay is just that in the exploding world of online auctions. But with more than 50 million registered users and almost $15 billion in annual merchandise sales, the only thing easier than selling on eBay is getting lumped in with all the other sellers....
Foundation Flash Applications for Mobile Devices
Foundation Flash Applications for Mobile Devices
In this book you'll learn:
  • The essentials of Flash Lite 1.1 and 2.X

  • How to create mobile applications and games

  • Best practices for structuring your mobile applications, from starting out to final deployment

  • How to integrate graphics, sound, and video...
Understanding Intrusion Detection through Visualization (Advances in Information Security)
Understanding Intrusion Detection through Visualization (Advances in Information Security)
With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has...
SQR in PeopleSoft and Other Applications Second Edition: PeopleSoft v.8
SQR in PeopleSoft and Other Applications Second Edition: PeopleSoft v.8
SQR in PeopleSoft and Other Applications fills a big gap in the enterprise computing marketplace. For starters, this book explains (beginning from near zero) how to program with Structured Query Report Writer (SQR). It discusses the peculiarities of writing SQR software to interact with PeopleSoft databases. Readers are shown how to...
Simple Computer Security: Disinfect Your PC
Simple Computer Security: Disinfect Your PC
This book discusses the primary issues and threats that face all computer and Internet users. Not only does it describe the symptoms, prevalence, and affects of the most common computer security problems, it also provides simple solutions so you and your family will have a safe and pleasant online and computing experience....
Half Life 2 Mods For Dummies (Computer/Tech)
Half Life 2 Mods For Dummies (Computer/Tech)
Modify gameplay, add textures, and integrate amazing effects

Develop intense environments, then share your design with players online

How cool would it be to build your own levels and customized weapons for Half-Life 2? This book will get you ready to mod so you can enjoy the ultimate gaming...

Lifehacker: 88 Tech Tricks to Turbocharge Your Day
Lifehacker: 88 Tech Tricks to Turbocharge Your Day
Redefine your personal productivity by tweaking, modding, mashing up, and repurposing Web apps, desktop software, and common everyday objects. The 88 "life hacks" -- clever shortcuts and lesser-known, faster ways to complete a task -- in this book are some of the best in Lifehacker.com's online archive. Every chapter describes an...
Journey to the Center of the Internet: Now Showing in 3-D (Book & CD)
Journey to the Center of the Internet: Now Showing in 3-D (Book & CD)
Jules Verne watch out! Now you can take a virtual tour to the centre of a computer network.

If you need to know the difference between a router and a bridge, or a WAN and a LAN, where do you start? Journey to the Center of the Network: Now Showing in 3D is a truely innovative book and CD package. It introduces the reader to the highly
...
Bioinformatics For Dummies (Math & Science)
Bioinformatics For Dummies (Math & Science)
Search databases and analyze sequences like a pro

Get the most out of your PC and the Web with the right tools

Explore the human genome and analyze DNA — without leaving your desktop! All it takes is the basics of molecular biology and the wealth of information in this friendly guide. You'll discover the...

Microsoft Exchange Server 2007 Unleashed
Microsoft Exchange Server 2007 Unleashed
This is the ultimate guide to the design, migration, implementation, administration, management, and support of an Exchange Server 2007 environment. The recommendations, tips, and tricks covered are based on more than two years of early adopter implementations of Exchange 2007. The authors highlight the features and functions that organizations...
Result Page: 727 726 725 724 723 722 721 720 719 718 717 716 715 714 713 712 711 710 709 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy