BGP

Building Reliable Networks with the Border Gateway Protocol

Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to m
Selengkapnya...

Integrating Excel and Access

In a corporate setting, the Microsoft Office Suite is an invaluable set of applications. One of Offices' biggest advantages is that its applications can work together to share information, produce rep
Selengkapnya...

Developing Android Applications with Adobe AIR

For developers who want to use their ActionScript skills to build mobile applications for the Android OS, this thorough guide will show them how to use the unique programming environment, architecture
Selengkapnya...

Java Cryptography

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
Selengkapnya...

App Inventor

Yes, you can create your own apps for Android phones—and it's easy to do. This extraordinary book introduces App Inventor for Android, a powerful visual tool that lets anyone build apps for Android-ba
Selengkapnya...

The Art of Concurrency

A Thread Monkey's Guide to Writing Parallel Applications

If you're looking to take full advantage of multi-core processors with concurrent programming, this practical book provides the knowledge and hands-on experience you need. The Art of Concurrency is on
Selengkapnya...

Understanding the Linux Kernel

In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions
Selengkapnya...

Learning Android

Develop Mobile Apps Using Java and Eclipse

Want to build apps for Android devices? This book is the perfect way to master the fundamentals. Written by experts who have taught this mobile platform to hundreds of developers in large organization
Selengkapnya...

Classic Shell Scripting

Hidden Commands that Unlock the Power of Unix

Shell scripting skills never go out of style. It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and
Selengkapnya...

The Information Diet

A Case for Conscious Consumption

How can readers cope with information overload? This insightful book makes a compelling case that information overload doesn't actually exist--the real problem is information overconsumption. "The Inf
Selengkapnya...

Building Extreme PCs

The Complete Guide to Computer Modding

Provides instructions on building, customizing, and modifying a PC, with information on components and how to build and test a system, along with a collection of customized PCs.

Cloud Application Architectures

Building Applications and Infrastructure in the Cloud

If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, hig
Selengkapnya...