Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Critical Chain Project Management (Artech House Professional Development Library)
Critical Chain Project Management (Artech House Professional Development Library)
Plan and manage projects that yield successful results all the time in half the time you?re used to with this new guide. Providing the theory, tools and techniques you need to implement critical chain project management in your organization, you learn how to reduce stress on a project team, eliminate cost and scheduling over-runs, effectively...
Radio Frequency Integrated Circuit Design (Artech House Microwave Library)
Radio Frequency Integrated Circuit Design (Artech House Microwave Library)
Radio frequency integrated circuit (RFIC) design is an exciting area for research
or product development. Technologies are constantly being improved, and as
they are, circuits formerly implemented as discrete solutions can now be integrated
onto a single chip. In addition to widely used applications such as cordless
phones and
...
Wireless IP and Building the Mobile Internet
Wireless IP and Building the Mobile Internet
Wireless IP and Building the Mobile Internet is the first book to take a comprehensive
look at the convergence of wireless and Internet technologies
giving rise to the mobile wireless Internet as we know it. In short, the book
endeavors to provide an overview of all the elements required to understand
and develop the future
...
CDMA Systems Capacity Engineering
CDMA Systems Capacity Engineering
The code division multiple access (CDMA) communication system is a wellestablished
technology in the sense that it is one of technically proven methods to
transmit voice information for multiple users via wireless communications during
the last decade. Further, CDMA is an emerging technology for next generation multimedia...
Integrated It Project Management: A Model-Centric Approach
Integrated It Project Management: A Model-Centric Approach
This book is a compilation ofmyextensive project management, enterprise
architecture, and applications development knowledge, skills, and industry
experiences gained during my 28 years as an information technology (IT)
professional in Canada and the United States. It is not intended to be another
theoretical book on project
...
LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

GPRS for Mobile Internet
GPRS for Mobile Internet
This book helps you understand how the GPRS system is used as a major technology building block for the emerging mobile Internet; the book also provides you with detailed coverage of a wide range of important topics.

This ground-breaking book offers you a comprehensive, in-depth presentation of GPRS (general packet radio service). The...

802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
IT Project Portfolio Management
IT Project Portfolio Management
While consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors...
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Innovations in Internetworking (Artech House Telecommunication Library)
Innovations in Internetworking (Artech House Telecommunication Library)
Choosing the proper boundaries between functions is perhaps the primary activity of the computer system designer. Design principles that provide guidance in this choice of function placement are among the most important tools of a system designer. This paper discusses one class of function placement argument that has been used for...
Mission-Critical Network Planning
Mission-Critical Network Planning
I wrote this book in the aftermath of the terrorist attacks that took place on September
11, 2001. Until then, I was planning to write this book at a much later time. But
the events of that day compelled me to immediately begin this work. As we have
seen, those events have had far-reaching repercussions in the information
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy