65% El aviso | [Stunning18] 2016-01-20 Dolores M - At A Lake (x85) 3456x5184 | DIRECT DOWNLOAD LINKS
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
Globalization of Financial Institutions: A Competitive Approach to Finance and Banking
Globalization of Financial Institutions: A Competitive Approach to Finance and Banking

This peer-reviewed volume from the Society for the Study of Business and Finance, discusses current issues in globalization and financial system from an international political and economic perspective. Contemporary instruments and actors in the global financial system are specially analyzed...

Next-Generation Internet: Architectures and Protocols
Next-Generation Internet: Architectures and Protocols

The field of computer networking has evolved significantly over the past four decades since the development of ARPANET, the first large-scale computer network. The Internet has become a part and parcel of everyday life virtually worldwide, and its influence on various fields is well recognized. The TCP/IP protocol suite and packet...

Intuitionistic Fuzzy Aggregation and Clustering (Studies in Fuzziness and Soft Computing)
Intuitionistic Fuzzy Aggregation and Clustering (Studies in Fuzziness and Soft Computing)

The concept of intuitionistic fuzzy set (IFS) was originally introduced by Atanassov (1983) to extend the concept of the traditional fuzzy set. Each element in an IFS is expressed by an ordered pair which is called an intuitionistic fuzzy value (IFV) (or intuitionistic fuzzy number (IFN)), and each IFV is characterized by a membership degree,...

Why Kids Kill: Inside the Minds of School Shooters
Why Kids Kill: Inside the Minds of School Shooters

Ten years after the school massacre at Columbine High School in Colorado, school shootings are a new and alarming epidemic. While sociologists have attributed the trigger of violence to peer pressure, such as bullying and social isolation, prominent...

Advanced Java 2 Platform: How to Program (With CD-ROM)
Advanced Java 2 Platform: How to Program (With CD-ROM)
The authoritative DEITEL LIVE-CODE guide to programming with the Java 2 Enterprise (J2SE), Standard (J2SE) and Micro (J2ME) Editions

Java has revolutionized application and enterprise-systems...

Professional Linux Programming
Professional Linux Programming
By tapping the strengths of the open-source movement, developers can write custom Linux software without spending a dime on licensing fees. Aimed at the experienced C/C++ programmer, Professional Linux Programming provides a wide-ranging and hands-on guide to the different pieces of the puzzle that are required to program successfully...
Self-* and P2P for Network Management: Design Principles and Case Studies (SpringerBriefs in Computer Science)
Self-* and P2P for Network Management: Design Principles and Case Studies (SpringerBriefs in Computer Science)

The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The employment of self-* properties and Peer-To-Peer (P2P) are seen as promising alternatives, able to provide the sophisticated solutions required.

...
Cooperative Task-Oriented Computing: Algorithms and Complexity
Cooperative Task-Oriented Computing: Algorithms and Complexity

Cooperative network supercomputing is becoming increasingly popular for harnessing the power of the global Internet computing platform. A typical Internet supercomputer consists of a master computer or server and a large number of computers called workers, performing computation on behalf of the master. Despite the simplicity and benefits of...

Intelligent Data Mining: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Data Mining: Techniques and Applications (Studies in Computational Intelligence)
"Intelligent Data Mining – Techniques and Applications" is an organized edited collection of contributed chapters covering basic knowledge for intelligent systems and data mining, applications in economic and management, industrial engineering and other related industrial applications. The main objective of this book is to gather a...
IBM InfoSphere Replication Server and Data Event Publisher
IBM InfoSphere Replication Server and Data Event Publisher

Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many...

POP3 und IMAP
POP3 und IMAP
There is very little specialist literature available on IMAP servers, and no current documentation deals with the subject in sufficient depth.

There is a real need for a guide to IMAP. A quick look at relevant mailing lists shows that they are full of questions and problems, indicating that the software solutions
...
Result Page: 24 23 22 21 20 19 18 17 16 15 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy