Home | Amazing | Today | Tags | Publishers | Years | Search 
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

RibbonX For Dummies (Computer/Tech)
RibbonX For Dummies (Computer/Tech)
Includes coding examples and sample conversion programs!

Create VBA, VB.NET, and C# custom applications with this radical new interface

Are you ready to tackle RibbonX? This friendly, plain-English guide gives you the tips and techniques you need to design and implement Ribbon...

Color Appearance Models (The Wiley-IS &T Series in Imaging Science and Technology)
Color Appearance Models (The Wiley-IS &T Series in Imaging Science and Technology)
The law of proportion according to which the several colors are formed, even if a man knew he would be foolish in telling, for he could not give any necessary reason, nor indeed any tolerable or probable explanation of them.
Plato

Despite Plato’s warning, this book is about one of the major unresolved issues in the field of
...
Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
The End of Software: Transforming Your Business for the On Demand Future
The End of Software: Transforming Your Business for the On Demand Future
Twenty-five years ago, the high-tech business was small, computers were largely relegated to accounting, and the money major corporations spent on information technology barely made a dent in their overall budgets. Today that has all changed. High-tech businesses are some of the largest in the world. The Dow Jones Industrial Average includes four...
Understanding Telecommunications and Lightwave Systems: An Entry-Level Guide, 3rd Edition
Understanding Telecommunications and Lightwave Systems: An Entry-Level Guide, 3rd Edition
"...provides a non-technical overview of contemporary telecommunications systems." (SciTech Book News, Vol. 26, No. 2, June 2002)

The up-to-date edition of the bestselling guide to the basics of telecommunications and digital technology

Understanding Telecommunications and...

Beta Testing for Better Software
Beta Testing for Better Software
Implement, operate, and use beta testing immediately with this hands-on guide to the best practices

Beta testing is a complex process that, when properly run, provides a wealth of diverse information. But when poorly executed, it delivers little or no data while wasting time and money. Written by a leading expert in the field, this book will...

ITU Handbook on Satellite Communications
ITU Handbook on Satellite Communications
An essential overview of satellite communications from the organization that sets the international standards

Since their introduction in the mid-1960s, satellite communications have grown from a futuristic experiment into an integral part of today’s "wired world." Satellite communications are at the core of a global,...

Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
The ActionScript 3.0 Migration Guide: Making the Move from ActionScript 2.0
The ActionScript 3.0 Migration Guide: Making the Move from ActionScript 2.0
When Flash Player 9 released in June 2006, it introduced the new scripting language, ActionScript 3, which has already taken hold in the Adobe Flex application development community. ActionScript 3 provides not only a significant enhancement in performance, but also a more robust programming model that lends itself to complex Rich Internet...
Result Page: 1040 1039 1038 1037 1036 1035 1034 1033 1032 1031 1030 1029 1028 1027 1026 1025 1024 1023 1022 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy