- CCNA Cisco Certified Network Associate Fast Pass 3rd Edition
- Ajax Design Patterns
- Designing Reliable and Efficient Networks on Chips
- Cladding of Buildings
- Guide to Wireless Sensor Networks
- Linux Timesaving Techniques For Dummies
- How to be a Programmer
- Gröbner Bases, Coding, and Cryptography
- Voice over Internet Protocol (VoIP) Security
- Financial Numerical Recipes in C++
Posted: 03 Jun 2009 05:11 PM PDT
The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:
*Designing Cisco internetworks
*Developing an access list
*Evaluating TCP/IP communication
*Configuring routers and switches
*Configuring IP addresses, subnet masks, and gateway addresses
*Performing LAN, VLAN, and WAN troubleshooting
*Understanding rules for packet control
The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.
Posted: 03 Jun 2009 05:10 PM PDT
Ajax Design Patterns shows you best practices that can dramatically improve your web development projects. It investigates how others have successfully dealt with conflicting design principles in the past and then relays that information directly to you.
The patterns outlined in the book fall into four categories:
Ajax Design Patterns will also get you up to speed with core Ajax technologies, such as XMLHttpRequest, the DOM, and JSON. Technical discussions are followed by code examples so you can see for yourself just what is-and isn’t-possible with Ajax. This handy reference will help you to produce high-quality Ajax architectures, streamline web application performance, and improve the user experience.
Posted: 03 Jun 2009 05:09 PM PDT
Developing NoC based interconnect tailored to a particular application domain, satisfying the application performance constraints with minimum power-area overhead is a major challenge. With technology scaling, as the geometries of on-chip devices reach the physical limits of operation, another important design challenge for NoCs will be to provide dynamic (run-time) support against permanent and intermittent faults that can occur in the system. The purpose of Designing Reliable and Efficient Networks on Chips is to provide state-of-the-art methods to solve some of the most important and time-intensive problems encountered during NoC design.
Posted: 03 Jun 2009 05:08 PM PDT
Written by well-known specialists, this key, well-illustrated text addresses the topic of lightweight claddings in buildings and is a useful guide and reference. This new edition incorporates the latest environmental issues and use of new materials.
Posted: 03 Jun 2009 05:06 PM PDT
Wireless communication technologies continue to undergo rapid advancement. In recent years, there has been a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributed, autonomous sensor nodes equipped to sense specific information. WSNs can be found in a variety of both military and civilian applications worldwide. Examples include detecting enemy intrusion on the battlefield, object tracking, habitat monitoring, patient monitoring and fire detection. Sensor networks are emerging as an attractive technology with great promise for the future. However, challenges remain to be addressed in issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy efficiency and security. This highly useful guide presents a comprehensive account of the fundamental concepts, new ideas and results in the field of WSNs.
Posted: 03 Jun 2009 05:05 PM PDT
Posted: 03 Jun 2009 05:04 PM PDT
The text is primarily concerned with social situations and team relationships that occur in typical software development. The author tried to cover what he considers the essential, often non-techncial, skills of the beginning, intermediate and advanced programmer. To the beginner, it may be a peek into the culture of the software engineer; to the advanced programmer, it is an opinionated review.
Posted: 03 Jun 2009 05:02 PM PDT
Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations.
This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation.
Posted: 03 Jun 2009 05:01 PM PDT
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today’s complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.
* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures
Posted: 03 Jun 2009 04:59 PM PDT
In finance, there are areas where formulas tend to get involved. Sometimes it may be easier to follow an exact computer routine. The author made some C++ subroutines that implements common algorithms in finance. Typical examples are option/derivatives pricing, term structure calculations, mean variance analysis. These routines are presented together with a good deal of explanations and examples of use, but it is by no means a complete book with all the answers and explanations.
|You are subscribed to email updates from Download Free Computer Ebooks - NET BOOKS |
To stop receiving these emails, you may unsubscribe now.
|Email delivery powered by Google|
|Inbox too full?|
|If you prefer to unsubscribe via postal mail, write to: Download Free Computer Ebooks - NET BOOKS, c/o Google, 20 W Kinzie, Chicago IL USA 60610|