Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Geoinformation: Remote Sensing, Photogrammetry and Geographic Information Systems, Second Edition
Geoinformation: Remote Sensing, Photogrammetry and Geographic Information Systems, Second Edition
Surveying and mapping has recently undergone a transition from discipline-oriented technologies, such as geodesy, surveying, photogrammetry and cartography, to the methodology-oriented integrated discipline of geoinformatics based on GPS positioning, remote sensing, digital photography for data acquisition, and GIS for data manipulation and data...
Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
This book concentrates on three main challenges of video coding for mobile communications: higher coding efficiency, reduced computational complexity, and improved error resilience. Unlike other high level books and articles that focus on individual aspects in this field, this book has been designed as a quick, easy, and practical introduction to...
Analog Circuit Design: Scalable Analog Circuit Design, High-Speed D/A Converters, RF Power Amplifiers
Analog Circuit Design: Scalable Analog Circuit Design, High-Speed D/A Converters, RF Power Amplifiers

This tenth volume of Analog Circuit Design concentrates on 3 topics: 1. Scalable Analog Circuits, 2. High-Speed D/A Converters, and 3. RF Power Amplifiers. Each topic is covered by 6 papers, written by international recognized experts on that topic. These papers have a tutorial nature aimed at improving the design of analog circuits....

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

2D Object Detection and Recognition: Models, Algorithms, and Networks
2D Object Detection and Recognition: Models, Algorithms, and Networks
This book is about detecting and recognizing 2D objects in gray-level images. Howare
models constructed? Howare they trained? What are the computational approaches to
efficient implementation on a computer? And finally, how can some of these computations
be implemented in the framework of parallel and biologically plausible neural...
Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

Aspect-Oriented Programming with AspectJ
Aspect-Oriented Programming with AspectJ
In a November 2001 Java Pro magazine article, noted Java pundit Daniel Savarese states, "The days of Object-Oriented Programming may be numbered, One day we may all be using Aspect-Oriented Programming ." While this may be hyperbole, the AOP bring certain needed improvements to the OOP. AspectJ is a Java-based tool that allows...
Personal Firewalls for Administrators and Remote Users
Personal Firewalls for Administrators and Remote Users

Personal firewalls explained—for remote corporate and home users.

In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these...

Modern Compiler Implementation in Java
Modern Compiler Implementation in Java

This textbook describes all phases of a compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code generation and register...

Holy War, Holy Peace: How Religion Can Bring Peace to the Middle East
Holy War, Holy Peace: How Religion Can Bring Peace to the Middle East
Part I: Analysis 1. The Interaction between Religion and Culture in Peace and Conflict 2. Family Myths and Cultural Conflict 3. Political and Mythic Interdependencies 4. Patterns of Abrahamic Incrimination 5. Conflict, Injury, and Transformation Part II: Practical Applications 6. Patterns of Abrahamic Reconciliation: Act, Ritual, and Symbol as...
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy