Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Developing iOS Applications with Flex 4.5
Developing iOS Applications with Flex 4.5

Apple originally introduced iOS in January of 2007 as the operating system for the iPhone, under the original name of iPhone OS. In June of 2010, Apple renamed its mobile operating system to iOS.

This book will walk you through the creation of your first Adobe AIR application using the Flex 4.5 framework and...

Packet Guide to Routing and Switching
Packet Guide to Routing and Switching

For a long time, I was very happy building Ethernet networks, working with switches and then moving to 802.11. It took awhile, but eventually I realized that the world of interconnected networks cannot be reached with Layer 2 alone. In addition, as you spread your wings from the Layer 2 broadcast domains, you encounter the wonders of...

Cisco Unified Presence Fundamentals (Networking Technology: IP Communications)
Cisco Unified Presence Fundamentals (Networking Technology: IP Communications)

Unified Communications and Collaboration is on the so-called “Hot List” in any forum wherein people are discussing communications and ways to better stay in touch. This book is aimed at explaining the concepts, ideas, and capabilities behind Presence, which is likely one of the least understood and most underestimated features in...

Expert Resumes for Computer and Web Jobs, 3rd Ed
Expert Resumes for Computer and Web Jobs, 3rd Ed

Job search and career management become remarkably more complex and more competitive with each passing year. One major contributor to the new complexity is technology itself, which has created entirely new methods and systems for job search, recruitment, hiring, and lifelong career development.

Fortunately, this new...

97 Things Every Software Architect Should Know: Collective Wisdom from the Experts
97 Things Every Software Architect Should Know: Collective Wisdom from the Experts

Software arch itects occupy a unique space in the world of IT. They are expected to know the technologies and software platforms on which their organizations run as well as the businesses that they serve. A great software architect needs to master both sides of the architect’s coin: business and technology. This is no small...

Adobe Photoshop CS3: Introductory Concepts and Techniques
Adobe Photoshop CS3: Introductory Concepts and Techniques

The Shelly Cashman Series® offers the finest textbooks in computer education. We are proud of the fact that our textbook series has been the most widely used in education. Adobe® Photoshop® CS3: Introductory Concepts and Techniques continues with the innovation, quality, and reliability that you have come to expect from the...

An Introduction To The Theory Of Spatial Object Modelling For GIS (Research Monographs in GIS)
An Introduction To The Theory Of Spatial Object Modelling For GIS (Research Monographs in GIS)

In 1983 I left the International Institute for Aerospace Survey and Earth Sciences (ITC) and went to Wageningen Agricultural University, where I took the chair of “Land Surveying and Teledetection”. Up to that time I had been active mainly in geodesy and photogrammetry, but at Wageningen it soon became...

Queueing Networks: A Fundamental Approach (International Series in Operations Research & Management Science)
Queueing Networks: A Fundamental Approach (International Series in Operations Research & Management Science)

The origin of queueing theory and its application traces back to Erlang’s historical work for telephony networks as recently celebrated by the Erlang Centennial, 100 Years of Queueing, Copenhagen, recalling his first paper in 1909. Ever since, the simplicity and fundamental flavour of Erlang’s famous expressions, such as his...

Video Segmentation and Its Applications
Video Segmentation and Its Applications

Video segmentation has been a key technique for visual information extraction and plays an important role in digital video processing, pattern recognition, and computer vision. A wide range of video-based applications will benefit from advances in video segmentation including security and surveillance, bank transactions monitoring,...

Formal Methods for Concurrency
Formal Methods for Concurrency

The aim of this work is to provide a practical introduction to the formal specification of concurrent and real-time systems. It is intended for those with some basic knowledge or experience of computing but does not assume knowledge of the particular problems of concurrent and real-time systems. It concentrates on one group of languages,...

Compiler Specification and Verification (Lecture Notes in Computer Science)
Compiler Specification and Verification (Lecture Notes in Computer Science)

About four years ago David Luckham hinted to me the possibility of verifying a "real" compiler. At that time the idea seemed unrealistic, even absurd. After looking closer at the problem and getting more familiar with the possibilities of the Stanford verifier a verified compiler appeared not so impossible after all. In...

Result Page: 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy