Home | Amazing | Today | Tags | Publishers | Years | Search 
Foundations of Object-Oriented Programming Using .NET 2.0 Patterns
Foundations of Object-Oriented Programming Using .NET 2.0 Patterns
Patterns are an interesting topic that has already been thoroughly discussed. The book that
originally started the pattern phenomenon was Design Patterns: Elements of Reusable Object-
Oriented Software by Erich Gamma et al. (Boston: Addison-Wesley, 1995). At the time the book
was published, it presented new ideas and concepts. Now it
...
Approximation Theory: From Taylor Polynomials to Wavelets (Applied and Numerical Harmonic Analysis)
Approximation Theory: From Taylor Polynomials to Wavelets (Applied and Numerical Harmonic Analysis)

This concisely written book gives an elementary introduction to a classical area of mathematics – approximation theory – in a way that naturally leads to the modern field of wavelets.  The exposition, driven by ideas rather than technical details and proofs, demonstrates the dynamic nature of mathematics and the...

Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance

  • Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...

Foundations of Ajax
Foundations of Ajax
We thought we had found the Holy Grail of software development when we started building
Web applications several years ago. Previously we had been developing thick client applications
that required a lengthy installation process every time a new version of the company’s
application was released. The application was deployed to
...
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach...
Location-Based Services: Fundamentals and Operation
Location-Based Services: Fundamentals and Operation
Location-based Services (LBSs) are mobile services for providing information that has been created, compiled, selected or filtered under consideration of the users’ current locations or those of other persons or mobile devices. Typical examples are restaurant finders, buddy trackers, navigation services or applications in the areas of mobile...
SDH/SONET Explained in Functional Models: Modeling the Optical Transport Network
SDH/SONET Explained in Functional Models: Modeling the Optical Transport Network
SDH/SONET Explained in Functional Models represents a fresh approach to the modeling of transport network technologies. This practical guide and reference text uncovers the description of SDH (Synchronous Digital Hierarchy), SONET (Synchronous Optical Network) and OTN (Optical Transport Network) transport networks and equipment using...
Fiber to the Home: The New Empowerment
Fiber to the Home: The New Empowerment
A compelling treatment of FTTH

Written by telecommunications pioneer Paul Green Jr., Fiber to the Home is a comprehensive examination of the technical and social implications of fiber to the home (FTTH), the technology that extends the current fiber optic backbone to optically connect it directly to homes and offices.

Fiber to the...

Red Hat Fedora Linux Secrets
Red Hat Fedora Linux Secrets
Learn how to release the full potential of Red Hat Fedora Linux and install the latest release of Fedora Core (FC4) with this comprehensive guide. Within these pages, you'll be privy to valuable secrets contained in FC4: yum, up2date, mandatory access control with Security Enhanced Linux, and improved device handling with udev. You'll go behind the...
BitTorrent For Dummies
BitTorrent For Dummies
If you've found your way to this guide, and you're asking yourself, well what the heck is BT, you've gotten a little ahead of yourself. That's OK. Just take a look for the BT FAQ in the Getting Started section of the Groove.
By now, you should have gotten pretty familiar with BitTorrent, shorten, md5s, and maybe even flac. But you're just not
...
The Evolution from Protein Chemistry to Proteomics: Basic Science to Clinical Application
The Evolution from Protein Chemistry to Proteomics: Basic Science to Clinical Application

Largely driven by major improvements in the analytical capability of mass spectrometry, proteomics is being applied to broader areas of experimental biology, ranging from oncology research to plant biology to environmental health. However, while it has already eclipsed solution protein chemistry as a discipline, it is still essentially an...

Final Cut Pro 5 Editing Essentials (DV Expert Series)
Final Cut Pro 5 Editing Essentials (DV Expert Series)
Digital editing gives editors far greater freedom than ever before to move scenes of information around and place them anywhere in a film's sequence. Apple's Final Cut Pro is the most widely used Mac-based digital editor, and is especially popular with independent filmmakers and graphic artists. Final Cut Pro 5 Editing Essentials enables readers to...
Result Page: Previous 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy