Networking
epub |eng | 2013-05-16 | Author:Erl, Thomas & Puttini, Ricardo & Mahmood, Zaigham [Erl, Thomas]

* * * Case Study Example DTGOV has been offering its cloud consumers a user-friendly remote administration system for some time, and recently determined that upgrades are required in order ...
( Category: Client-Server Systems February 15,2015 )
epub |eng | 2012-06-03 | Author:C. Robert Welti, PhD [C. Robert Welti, PhD]

Figure 3-18 Thrusters (NASA-Goddard Space Flight Center) Figure 3-19 is a schematic representation of how the orbit maneuver thruster and AOC thrusters mount on the satellite to perform major orbit ...
( Category: Satellite February 15,2015 )
azw3 |eng | 2009-02-08 | Author:Corbet, Jonathan & Rubini, Alessandro & Kroah-Hartman, Greg [Corbet, Jonathan]

Hardware Abstractions We complete the discussion of PCI by taking a quick look at how the system handles the plethora of PCI controllers available on the marketplace. This is just ...
( Category: Device Drivers February 13,2015 )
azw3 |eng | 2009-03-01 | Author:Donahoo, Michael J. & Calvert, Kenneth L. [Donahoo, Michael J.]

The method GetNextMsg() reads data from the given stream and places it in the given buffer until it runs out of room or determines that it has received a complete ...
( Category: C February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]

Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category: Localization February 13,2015 )
azw3 |eng | 2012-12-14 | Author:

It is ironic that Cass would not include the liminality of gays among her themes, particularly since her best known work arguably is her refinement of the stepped model for ...
( Category: Networks February 13,2015 )
mobi |eng | 2009-02-08 | Author:Greg Kroah-Hartman

Synopsis ihash_entries= n Override the default number of hash buckets for the kernel's inode cache. Recommended only for kernel experts. Name max_addr — Ignore memory. Synopsis max_addr= n Cause the ...
( Category: Networking & System Administration February 13,2015 )
mobi |eng | 2011-09-04 | Author:Massimo Banzi

( Category: Robotics & Automation February 12,2015 )
epub |eng | 2012-08-31 | Author:Janice (ginny) Redish [Redish, Janice]

Thinking about headings also helps authors Headings form an outline of what you are going to write. Planning the headings is a way of analyzing the information you have, grouping ...
( Category: User Experience & Usability February 5,2015 )
epub |eng | | Author:Katherine Tarbox

In the morning I felt even more distraught than I had the night before. To make matters worse, my mom had bought bagels and cereal the night before for a ...
( Category: Internet, Groupware, & Telecommunications January 29,2015 )
epub, mobi |eng | 2009-09-18 | Author:Tom Standage

crYPTOGRAPHY—tinkering with codes and ciphers—was a common hobby among Victorian gentlemen. Wheatstone and his friend Charles Bab-bage, who is best known for his failed attempts to build a mechanical computer, ...
( Category: History January 28,2015 )
epub |eng | 2014-01-25 | Author:Jason Beaird, James George [Beaird, Jason]

Figure 3.12. Speed Kids It may not be apparent at first, but the shapes in this page’s illustration are the key elements that define the layout. One way to determine ...
( Category: Internet, Groupware, & Telecommunications January 26,2015 )
epub |eng | 2012-06-26 | Author:Janice (Ginny) Redish

Thinking about headings also helps authors Headings form an outline of what you are going to write. Planning the headings is a way of analyzing the information you have, grouping ...
( Category: User Experience & Usability January 26,2015 )
epub |eng | 2010-12-14 | Author:Robert Faludi [Robert Faludi]

Chapter 6. Sleeping, Then Changing the World Whew! At this point, the book has covered a lot of ground and you have come a long way in a very short ...
( Category: Networks January 25,2015 )
epub |eng | 2013-09-14 | Author:Todd Lammle

We’ll cover these types of access lists in more depth later in the chapter. Once you create an access list, it’s not really going to do anything until you apply ...
( Category: Bridges & Routers January 24,2015 )