With the continued success of the USB interface, there exists a need to adapt USB technology to serve newer computing platforms and devices as they trend toward smaller, thinner and lighter form-factors. Many of these newer platforms and devices are
Windows PowerShell is a task-based command-line shell and scr ipting language designed especially for system administration. Hyper-V is Microsoft's hypervisor that creates and runs virtual machines. Hyper-V for Windows PowerShell provides IT pros wi
If you're an experienced Python programmer, Python in Practice will help you improve the quality, reliability, speed, maintainability, and usability of all your Python programs. Mark Summerfield focuses on four key themes: design patterns for coding
F1 is a distributed relational database system built at Google to support the AdWords business. F1 is a hybrid database that combines high availability, the scalability of NoSQL systems like Bigtable, and the consistency and usability of traditional
Responsive Web Design is redefining the way websites are designed, enabling you to craft websites that deliver exceptional experiences to your users - whether they happen to be using a desktop PC, tablet or mobile device. Use media queries to maximi
Contents Acknowledgments xxxi About the Authors xxxiii Introduction 1 Who Should Read This Book 1 Key Questions Answered in This Book 2 How This Book Is Structured 2 An Overview of Changes in This Edition 3 Development Environments Used in This Book
Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usabili
远程登录、传输文件。 The SSH Secure Shell for Workstations (SSH2 client) is a program that allows secure network services over an insecure network. SSH Secure Shell for Workstations replaces other, insecure terminal applications, such as Telnet and FTP. It al
Complete Web Monitoring demonstrates how to measure every aspect of your web presence -- including analytics, backend performance, usability, communities, customer feedback, and competitive analysis -- whether you're running an e-commerce site, a co
Chapter 1. Requirements Phase Item 1: Involve Testers from the Beginning Item 2: Verify the Requirements Item 3: Design Test Procedures As Soon As Requirements Are Available Item 4: Ensure That Requirement Changes Are Communicated Item 5: Beware of
Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World Build a working knowledge of data modeling concepts and best practices, along with how to apply these principles with ER/Studio.
The article describes a new algorithm for calibrating a Kinect sensor that achieves high accuracy using only 6 to 10 image-disparity pairs of a planar checkerboard pattern. The method estimates the projection parameters for both color and depth came
There is no doubt that Emacs is the most powerful text editor available! Unfortunately Emacs has quite a reputation for being difficult to learn and hard to use. With this book this will not be true for you, for the following reasons: The book is or
从事RAILS开发的人员如何使用AJAX. Learn to build dynamic, interactive web applications using the two most important approaches to web development today: Ajax and the phenomenally efficient Ruby on Rails platform. This book teaches intermediate to advanced web d