Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kerberos: The Definitive Guide
Kerberos: The Definitive Guide
Kerberos is a sophisticated network authentication system—one that has been publicly available since 1989 and provides that eternal holy grail of network administrators, single-sign-on. Yet, in that intervening decade, documentation on Kerberos has been notably lacking. While many large organizations and academic institutions have enjoyed the...
Buliding N1™ Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers (Official Sun Microsystems Resource)
Buliding N1™ Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers (Official Sun Microsystems Resource)

The N1 Grid is Sun's vision, strategy, and architecture—and a set of products—that redefine the nature of data center computing. The N1 Grid architecture uses the network, physically and logically, as its fundamental organizing principle.

This book enables the reader to implement service-centric data center solutions through...

Radar System Performance Modeling, Second Edition
Radar System Performance Modeling, Second Edition
This book addresses the needs of system analysts for radar models and analysis
tools. It describes the basic principles of radar operation, how radar is configured
and used in military and civilian systems, and how to analyze and model radar at the
system level. The book presents and explains equations, computational methods,...
Adobe InDesign CS2 @work: Projects You Can Use on the Job
Adobe InDesign CS2 @work: Projects You Can Use on the Job

Adobe InDesign CS2 is a powerful, but complicated, page layout technology. Sure, learning how to use the various tools and techniques is important, but what you really need and want to know is how to put those tools and techniques to use to complete projects at work. That's where Adobe InDesign CS2 @...

Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
Fundamentals of Switching Theory and Logic Design: A Hands on Approach
Fundamentals of Switching Theory and Logic Design: A Hands on Approach
Information Science and Digital Technology form an immensely complex
and wide subject that extends from social implications of technological
development to deep mathematical foundations of the techniques
that make this development possible. This puts very high demands
on the education of computer science and engineering. To be
...
Web Development Solutions: Ajax, APIs, Libraries, and Hosted Services Made Easy
Web Development Solutions: Ajax, APIs, Libraries, and Hosted Services Made Easy
As a web user, you'll no doubt have noticed some of the breathtaking applications available in today's modern web, such as Google Maps and Flickrdesktop applications than the old style web sites you are used to. You've probably also wished that you could create such things, and then thought "nahhh, I'd need to know a lot of complicated code to...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Wireless Home Networking For Dummies
Wireless Home Networking For Dummies
Wireless home networks are better than ever! The emergence of new industry standards has made them easier, more convenient, less expensive to own and operate. Still, you need to know what to look for (and look out for), and the expert guidance you’ll find in Wireless Home Networks For Dummies, 3rd Edition helps you ensure that your...
Advances in Computational Intelligence: Theory And Applications
Advances in Computational Intelligence: Theory And Applications
Computational Intelligence (CI) is a recently emerging area in fundamental and applied research, exploiting a number of advanced information processing technologies that mainly embody neural networks, fuzzy logic and evolutionary computation. With a major concern to exploiting the tolerance for imperfection, uncertainty, and partial truth to...
How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
". . . a unique book that is fun to read while still providing valuable information." -- CodeGuru.com

". . .[like] cross training with the drill sergeant of debugging. . ." -- Chris Pelsor, Flash Developer

"If you have been programming in C++ for a while, this book is and excellent
...
More iPhone 3 Development: Tackling iPhone SDK 3 (Beginning)
More iPhone 3 Development: Tackling iPhone SDK 3 (Beginning)

Interested in iPhone development? Want to learn more? Whether you’re a self-taught iPhone development genius or have just made your way through the pages of Beginning iPhone 3 Development, we have the perfect book for you.

More iPhone 3 Development: Tackling iPhone SDK 3 digs deeper into Apple’s latest SDK.
...
unlimited object storage image
Result Page: 503 502 501 500 499 498 497 496 495 494 493 492 491 490 489 488 487 486 485 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy