Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
FiWi Access Networks
FiWi Access Networks

The evolution of broadband access networks toward bimodal fiber-wireless (FiWi) access networks, described in this book, may be viewed as the endgame of broadband access. After discussing the economic impact of broadband access and current worldwide deployment statistics, all the major legacy wireline and wireless broadband access...

Schaum's Outline of Numerical Analysis
Schaum's Outline of Numerical Analysis

If you want top grades and thorough understanding of numerical analysis, this powerful study tool is the best tutor you can have! It takes you step-by-step through the subject and gives you accompanying related problems with fully worked solutions. You also get additional problems to solve on your own, working at your own speed. (Answers at...

Special Issue on Emerging Bacterial Toxins (Reviews of Physiology, Biochemistry and Pharmacology)
Special Issue on Emerging Bacterial Toxins (Reviews of Physiology, Biochemistry and Pharmacology)
Many bacterial ADP-ribosyltransferases are potent bacterial protein toxins and important virulence factors. After cellular uptake caused by highly efficient cell entry mechanisms, they modify eukaryotic target proteins with great specificity and often grossly affect biological functions of their targets. These properties of the...
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)

Based on the author's lecture notes and research, this well-illustrated and comprehensive text is one of the first to provide an introduction to image registration with particular emphasis on numerical methods in medical imaging. Ideal for researchers in industry and academia, it is also a suitable study guide for graduate mathematicians,...

Fundamentals of Digital Imaging in Medicine
Fundamentals of Digital Imaging in Medicine
There was a time not so long ago, well within the memory of many of us, when medical imaging was an analog process in which X-rays, or reflected ultrasound signals, exiting from a patient were intercepted by a detector, and their intensity depicted as bright spots on a fluorescent screen or dark areas in a photographic film. The...
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

The Browser Hacker's Handbook
The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...

Linux Operations and Administration
Linux Operations and Administration

LINUX OPERATIONS AND ADMINISTRATION introduces readers to Linux operations and system administration through a unified installation, using virtual machines. This text is more effective than those that take a professional approach because it eliminates confusion from working with differing hardware configurations, while allowing users to test...

Problem Solving and Program Design in C (7th Edition)
Problem Solving and Program Design in C (7th Edition)

Problem Solving and Program Design in C is one of the best-selling introductory programming textbooks using the C programming language. It embraces a balanced approach to program development and an introduction to ANSI C. The book provides a gradual introduction to pointers and covers programming with...

Database Modeling and Design, Fifth Edition: Logical Design (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling and Design, Fifth Edition: Logical Design (The Morgan Kaufmann Series in Data Management Systems)

Database Modeling and Design, Fifth Edition, focuses on techniques for database design in relational database systems.

This extensively revised fifth edition features clear explanations, lots of terrific examples and an illustrative case, and practical advice, with design rules that are applicable to any SQL-based system....

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.

A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers...

©2017 LearnIT (support@pdfchm.net) - Privacy Policy