 |
|
 Ubuntu 8.10 Linux BibleA Linux distribution is basically the sum of the things that you need to run Linux on your computer. There are many different Linux distributions, each with its own target audience, set of features, administrative tools, and fan club, the latter of which is more properly known as a user community. Putting aside the downright fanatics, most of the... |  |  Designing Steel Structures for Fire SafetyStructural design in fire conditions is conceptually similar to structural design in normal temperature conditions, but often more difficult because of internal forces induced by thermal expansion, strength reduction due to elevated temperatures, much larger deflections, and numerous other factors. Before making any design decisions it is... |  |  CompTIA Network+ Deluxe Study Guide: (Exam N10-004)
More than 220,000 network professionals have achieved the Network+ certification since its inception, second only to the Cisco Certified Network Associate certification. This hardcover edition includes Sybex CompTIA Network+ Virtual Lab network simulator plus four additional bonus exams and 100 additional flashcards and is fully updated for... |
|
|
 OPC Unified Architecture
The OPC Foundation provides specifications for data exchange in industrial automation.
There is a long history of COM/DCOM-based specifications, most prominent
OPC Data Access (DA), OPC Alarms and Events (A&E), and OPC Historical
Data Access (HDA), which are widely accepted in the industry and implemented
by almost every... |  |  Fundamentals of Three-dimensional Digital Image ProcessingThere are many areas of science and engineering where three-dimensional (3-D) discrete data are collected and analyzed, such as medical imaging and geoscience. To design and to prove the validity of computational procedures for processing and analysis of such data, the need for a mathematical theory and algorithms for image processing is essential.... |  |  |
|
 |  |  |  |  Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... |
|
Result Page: Previous 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 Next |