Home | Amazing | Today | Tags | Publishers | Years | Search 
Embedded Linux: Hardware, Software, and Interfacing
Embedded Linux: Hardware, Software, and Interfacing

Embedded Linux covers the development and implementation of interfacing applications on an embedded Linux platform. It includes a comprehensive discussion of platform selection, crosscompilation, kernel compilation, root filesystem creation, booting, remote debugging, real-world interfacing, application control, data...

Broadband Packet Switching Technologies: A Practical Guide to ATM Switches and IP Routers
Broadband Packet Switching Technologies: A Practical Guide to ATM Switches and IP Routers
The effective design of high-speed, reliable switching systems is essential for moving the huge volumes of traffic and multimedia over modern communications networks. This book explains all the main packet-switching architectures, including all theoretical and practical topics relevant to the design and management of high-speed networks. Delivering...
Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)
Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)
This text is based on a simple and fully reactive computational model that allows for intuitive comprehension and logical designs. The principles and techniques presented can be applied to any distributed computing environment (e.g., distributed systems, communication networks, data networks, grid networks, internet, etc.). The text provides a...
Network Service Investment Guide: Maximizing ROI in Uncertain Times (Networking Council)
Network Service Investment Guide: Maximizing ROI in Uncertain Times (Networking Council)
This book analyzes network-based services using a new framework that links market uncertainty to the choice between distributed management
structure and centralized management structure. It explores communications technology and suggests how investors, managers, service providers,
and consultants can make better decisions about
...
How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the
...
JSP Tag Libraries
JSP Tag Libraries
Shows HTML and Java programmers how to create and use JSP tag components to perform iterations and access databases, and manipulate EJB's, e-mail systems, Java Beans, and e-commerce applications and WAP that work with cellular phones.

Six years ago, Java burst onto the computing scene and dramatically changed the way programmers develop
...
Pro Oracle Collaboration Suite 10g
Pro Oracle Collaboration Suite 10g

OCS is becoming the dominant product for large-scale collaboration--blending core functions of e-mail, file serving, and diary management with the additional functionality of web conferencing, instant messaging, and wireless access. Pro Oracle Collaboration Suite 10g provides all you need to know to install and configure OCS for use,...

Converged Multimedia Networks
Converged Multimedia Networks
This book focuses largely on enabling technologies for network convergence.В  A principal aim is to show where parallel functions exist in fixed and mobile voice network architectures and to explain how these functions will be combined. The authors describe the components of a future converged architecture and consider the following key...
Building .NET Applications for Mobile Devices
Building .NET Applications for Mobile Devices
Master mobile programming with this title! It demonstrates how to use the Microsoft .NET Framework and Visual Studio.Net to create applications for phones, Pocket PCs, and other portable devices. Focusing on ASP.NET and the .NET Mobile Web SDK, it shows how to deliver appropriately formatted content for diverse hand held clients from a single...
Designing Large Scale LANs
Designing Large Scale LANs
Large networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large...
Microsoft Windows Vista: Visual QuickStart Guide
Microsoft Windows Vista: Visual QuickStart Guide
This fast-paced, no-fluff book teaches you the basics of Microsoft Windows Vista and includes tips, shortcuts, and workarounds for Windows veterans as well as new users, whether you're using the Home, Business, Enterprise, or Ultimate edition of Vista. You'll find step-by-step instructions and plenty of screenshots that guide you through...
Result Page: 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy