Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
In 2005, the U.S. Government Accountability Office recommended that all agencies begin planning a coherent transition to IPv6. IPv6 will solve the problem of limited IP addresses and improve internetworking capabilities. This promising protocol is gaining momentum and it is only a matter of time before the transition will have to occur globally....
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
The Definitive Guide to Django: Web Development Done Right
The Definitive Guide to Django: Web Development Done Right
Django, the Python-based equivalent to the Ruby on Rails web development framework, is presently one of the hottest topics in web development today. In The Definitive Guide to Django: Web Development Done Right, Adrian Holovaty, one of Django's creators, and Django lead developer Jacob Kaplan-Moss show you how they use this framework to...
Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence presents an overview of computer forensics perfect for beginners. This volume will serve as a foundation and guide for: (a) students considering a career in this field; (b) the law enforcement investigator assigned to work cybercrimes; (c) establishing training programs for forensic...
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Silverlight and ASP.NET Revealed
Silverlight and ASP.NET Revealed
Microsoft Silverlight allows you to create rich multimedia interfaces with the power and flexibility of Flash, but with the extensibility and the great tools that .NET offers. With Silverlight and ASP.NET Revealed, you’ll learn to use Microsoft’s Silverlight technology in conjunction with ASP.NET and Visual Studio 2008 (codename Orcas)....
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
The Essential Resource for Oracle DBAs--Fully Updated and Expanded

Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new...

Fundamentals of the Physics of Solids: Volume 1: Structure and Dynamics
Fundamentals of the Physics of Solids: Volume 1: Structure and Dynamics
"This first volume a ] focuses on crystal structure and lattice dynamics. a ] provides a substantial amount of theoretical material at an advanced graduate level. a ] There is more material here than can be covered in a single semester, and this book is more detailed than the well-known books a ] . This volume would be most attractive for a...
Fine- and Coarse-Grain Reconfigurable Computing
Fine- and Coarse-Grain Reconfigurable Computing
Stamatis Vassiliadis was born in the small village of Manolates, on the Mediterranean island of Samos, Greece on July 19th, 1951. He passed away on April 7th, 2007 in Pijnacker, in the Netherlands. In between, he led a very remarkable life. As a child, he walked many kilometers through the mountains to reach his school and would study at night...
Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Samii's Essentials in Neurosurgery
Samii's Essentials in Neurosurgery

'Samii's Essentials in Neurosurgery' contains selected papers written by internationally recognized contributors who were trained by Professor Madjid Samii in Hannover, Germany. The main topics deal with cutting-edge technology in neurosurgery, skull-base surgery, and specific peripheral nerve, spine, and vascular surgeries. The...

From Signals to Colours: A Case-based Atlas of Electroanatomic Mapping in Complex Atrial arrhythmias
From Signals to Colours: A Case-based Atlas of Electroanatomic Mapping in Complex Atrial arrhythmias
What is a complex case? Although the concept of what is complex may be personal, there is a common sense of complexity in electrophysiology. In most cases, a complex case involves a patient who comes or is referred after a single or multiple unsuccessful procedures in other centres and is still suffering from the same or a similar...
Result Page: Previous 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy