Simulation and Modeling: Current Technologies and ApplicationsThe science of simulation and modeling (SM) strives to showcase the highest possible level of reality in order to determine the conditions necessary for optimal performance. SM is a multifaceted and complex field due to the numerous applications involved, particularly since SM applications range from nuclear reaction to supermarket queuing.... | | Ubuntu UnleashedIncorporating an advanced approach to presenting information about Ubuntu, Ubuntu Unleashed aims to provide the best and latest information that intermediate to advanced Linux users need to know about installation, configuration, system administration, server operations, and security. Written by renowned open source... | | Managing Humans: Biting and Humorous Tales of a Software Engineering ManagerManaging Humans is a selection of the best essays from Michael Lopp's web site, Rands In Repose. Drawing on Lopp's management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other. It is a place full... |
Oxidative Stress, Inflammation, and Health (Oxidative Stress and Disease)
Specifically focusing on the redox regulation of cell signaling responsible for oxidative stress and inflammatory tissue damage, this reference provides a comprehensive overview of cutting-edge research on the intracellular events mediating or preventing oxidative stress and pro-inflammatory processes induced by endogenous and xenobiotic... | | Windows Communication Foundation 3.5 Unleashed (2nd Edition)
Windows Communication Foundation (WCF) is Microsoft’s dynamic technology for allowing autonomous software to communicate. Superseding earlier technologies such as COM/DCOM, .NET Remoting, ASP.NET Web Services, and the Web Services Enhancements for .NET, WCF provides a single solution that is designed to always be... | | Computer Crime: A Crimefighter's Handbook (Computer Security)
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up... |
|