Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ATM Technology for Broadband Telecommunications Networks
ATM Technology for Broadband Telecommunications Networks
This textbook presents all the latest information on all aspects of each important component of ATM - the hottest telecommunications technology of this decade. It demonstrates how ATM internetworks several incompatible telecommunications technologies and provide the high-speed, high bandwidth backbone network that the entire telecom industry is...
Process Engineering Economics (Chemical Industries)
Process Engineering Economics (Chemical Industries)
This book may well be the best text available for showing how project evaluation and economics impact corporation finances…
-Chemical Engineering Progress

This reference outlines the fundamental concepts and strategies for economic assessments for informed management decisions in industry. The book illustrates how to...

Joint Cognitive Systems: Patterns in Cognitive Systems Engineering
Joint Cognitive Systems: Patterns in Cognitive Systems Engineering
Our fascination with new technologies is based on the assumption that more powerful automation will overcome human limitations and make our systems 'faster, better, cheaper,' resulting in simple, easy tasks for people. But how does new technology and more powerful automation change our work? Research in Cognitive Systems Engineering (CSE) looks at...
Design Reliability: Fundamentals and Applications
Design Reliability: Fundamentals and Applications
As engineering systems become more and more complex, industry has recognized the importance of system and product reliability and places ever increasing emphasis on it during the design phase. Despite its efforts, however, industry continues to lose billions of dollars each year because of unexpected system failures. Therefore, it becomes...
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:...
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition...
The Communications Handbook, Second Edition (Electrical Engineering Handbook)
The Communications Handbook, Second Edition (Electrical Engineering Handbook)
For more than six years, The Communications Handbook stood as the definitive, one-stop reference for the entire field. With new chapters and extensive revisions that reflect recent technological advances, the second edition is now poised to take its place on the desks of engineers, researchers, and students around the world. From fundamental...
Automated Data Analysis Using Excel
Automated Data Analysis Using Excel
Because the analysis of copious amounts of data and the preparation of custom reports often take away time from true research, the automation of these processes is paramount to ensure productivity. Exploring the core areas of automation, report generation, data acquisition, and data analysis, Automated Data Analysis Using Excel illustrates how to...
Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
We have witnessed the rapid growth in the popularity of the Internet technology over the past few years. The current network technologies provide ubiquitous access to a vast amount of information on a huge variety of topics, but limited bandwidth has constrained the impact and growth of broadband multimedia applications. To allow new broadband...
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid...
Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy