Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
Everyday life would be easier if we could simply talk with machines instead of having to program them. Before such talking robots can be built, however, there must be a theory of how communicating with natural language works. This requires not only a grammatical analysis of the language signs, but also a model of the cognitive agent, with...
Business Services Orchestration: The Hypertier of Information Technology
Business Services Orchestration: The Hypertier of Information Technology

Business Services Orchestration (BSO) is a new, unique, far-reaching industry technology encompassing the art of harmoniously organizing the interactions between business services. These business services may represent internal business processes of organizations. Integration of many of these internal legacy, custom, and COTS applications may,...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Open-Source ESBs in Action
Open-Source ESBs in Action
Most modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code....
Professional Team Foundation Server
Professional Team Foundation Server

This book is for project managers, IT administrators, and anyone whose role consists of administering Team Foundation Server on a daily basis, running a software project, setting up users, or handling security.

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of...

Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World

Traditional learning as we know it has evolved. Gone are the days when students need to travel to a physical location to learn. With the increase of mobile devices and broadband Internet services, learning can take place anywhere at any time. Effective Digital Learning is here to help you make the paradigm shift with...

Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
Sit down at the keyboard and cinch that deal! Press the send button and get the account!

Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...

Everyday Leadership: Getting Results in Business, Politics, and Life
Everyday Leadership: Getting Results in Business, Politics, and Life

?A book that truly speaks to everyone. . . . Always practical, often inspiring, this is more a reference book than a self-improvement text, and a great read for any would-be leader.”
?Roger Penske, owner of Penske Corporation and Penske Racing

?Sound, practical advice driven home with real-world examples. . . . This...

QuickTime for the Web: For Windows and Macintosh, Third Edition (QuickTime Developer Series)
QuickTime for the Web: For Windows and Macintosh, Third Edition (QuickTime Developer Series)
QuickTime is the industry standard for developing and distributing multimedia content on the Web and CD-ROM, for both Windows and Macintosh computers. Its powerful, extensible software architecture lets you deliver state-of-the-art digital content over the Web or on CD-ROM.

This third edition of the best-selling and award-winning
...
unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy