Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 5079

Melanie Holloway explores a cloud broker offering service level agreement negotiation and monitoring as a service to consumers. She proposes a negotiation mechanism, which enables the achievement of economically efficient agreements, and an approach for reliable consumer side availability monitoring in conjunction with strategies for robust monitor placement. The author addresses the loss of control of consumers over critical aspects, specifically... more...

With Windows 8, Microsoft completely reimagined the graphical user interface for its operating system, which now runs on both desktop PCs and tablets, but the overhaul was not without hitches and its dueling UIs (one designed for touch, the other for keyboards and mice) created significant confusion for users. Windows 10 (a free update to users of Windows 8 or Windows 7) fixes a number of the problems introduced by the... more...

Get the most from your Droid X right away with this entertaining Missing Manual. Veteran tech author Preston Gralla offers a guided tour of every feature, with lots of expert tips and tricks along the way. You'll learn how to use calling and texting features, take and share photos, enjoy streaming music and video, and much more. Packed with full-color illustrations, this engaging book covers everything from getting started to advanced features and... more...

Are you an engineer or a researcher developing RFID systems? Are you a manager considering deploying RFID-based applications? If so, this book is for you. Covering modern RFID systems, the challenges to RFID implementation are addressed using specific industrial research examples and common integration issues. The primary focus is on answering questions surrounding building scalable global Internet-based RFID networks. Key topics include RFID data... more...

A practical book which will help the readers understand how the container ecosystem and OpenStack work together. Key Features Gets you acquainted with containerization in private cloud Learn to effectively manage and secure your containers in OpenStack Practical use cases on container deployment and management using OpenStack components Book Description Containers are one of the most talked about technologies of... more...


This book describes in detail all required technologies and methodologies needed to create a comprehensive, functional design verification strategy and environment to tackle the toughest job of guaranteeing first-pass working silicon.  The author first outlines all of the verification sub-fields at a high level, with just enough depth to allow an engineer to grasp the field before delving into its detail.  He then describes in detail... more...

This book covers computationally innovative methods and technologies including data collection and elicitation, data processing, data analysis, data visualizations, and data presentation. It explores how digital humanists have harnessed the hypersociality and social technologies, benefited from the open-source sharing not only of data but of code, and made technological capabilities a critical part of humanities work. ... more...

The visual way to unlock the power of your MacBook If you're a visual learner who's eager to get up and running on all the MacBook has to offer, this fully illustrated and easy-to-follow guide is for you. Covering all the essential information you need to make the most of your MacBook, this new edition of Teach Yourself Visually MacBook provides you with the most up-to-date information on performing everyday tasks—quickly and easily.... more...

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other... more...

Custom-build your own dream PC, have fun doing it, and save yourself a lot of money in the process. This book will give you the confidence to buy the best-of-class components and assemble them with clear, step-by-step instructions. You'll build your own PC capable of effortlessly running the most graphic and CPU-intensive games, graphics software, and programming compilers available today. And because it's a PC that you built yourself,... more...