Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Mac Hacks: Tips & Tools for unlocking the power of OS X
Mac Hacks: Tips & Tools for unlocking the power of OS X

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them...

More iPhone Development with Swift: Exploring the iOS SDK
More iPhone Development with Swift: Exploring the iOS SDK

Interested in iPhone and iPad apps development? Want to learn more? Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, we have the perfect Swift-flavored book for you. (Source code has been updated to reflect Xcode 6.3.2 and Swift 1.2!)

The...

Data and Computer Communications (8th Edition)
Data and Computer Communications (8th Edition)

This book attempts to provide a unified overview of the broad field of data and computer communications. The organization of the book reflects an attempt to break this massive subject into comprehensible parts and to build, piece by piece, a survey of the state of the art.The book emphasizes basic...

iPad All-in-One For Dummies
iPad All-in-One For Dummies

Slate-style computers have been around for a few years, but it took Apple to make them catch on with the general public in a big way when it introduced the iPad. This small, less than a pound-and-a-half wonder has sold millions of units in its first year for good reason: It’s well designed, feature rich, and opens up a world of...

Ultra-Wideband Wireless Communications and Networks
Ultra-Wideband Wireless Communications and Networks
Ultra-wideband (UWB) technology has great potential for applications in wireless communications, radar and location. It has many benefits due to its ultra-wideband nature, which include high data rate, less path loss and better immunity to multipath propagation, availability of low-cost transceivers, low transmit power and low interference. Despite...
Wi-Fi Home Networking
Wi-Fi Home Networking

For many professionals, wireless home computer networking delivers the power of corporate technology — without the hassles of corporate living, and the mobile connectivity to all of the computers throughout your home (or backyard) — without rewiring.

That’s why if you plan to set up a wireless...

Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended....
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Giving a sound technical introduction to 3GPP LTE and SAE, this book explains the decisions taken during standardization while also examining the likely competition for LTE such as HSPA+ and WiMAX. As well as looking at next generation network technologies, Beyond 3G - Bringing Networks, Terminals and the Web Together describes the latest...
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Mobility has become increasingly important for both business and casual users of computing technology. With the widespread adoption of portable computing devices, such as laptops, PDAs, tablet computers, music players, and cell phones, people can have almost constant access to their personal data as well as to information that is shared with...
iPad: The Missing Manual (Missing Manuals)
iPad: The Missing Manual (Missing Manuals)

Apple’s wildly popular iPad and new iPad Mini come jam-packed with features, like access to your media library from the Web, Siri voice control, and seamless Facebook and Twitter integration. But to tap your iPad’s potential, you need a trustworthy owner’s manual. This bestselling book shows you how to import,...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy