Understand the essentials of CDMA wireless technology and develop the knowledge you need to design and operate either co-located AMPS and CDMA or dedicated CDMA systems with this unique reference. Drawing upon his recent experience in building the first major CDMA network in North America, the author helps you acquire the knowledge you need...
CSP notation has been used extensively for teaching and applying concurrency theory, ever since the publication of the text Communicating Sequential Processes by C.A.R. Hoare in 1985. Both a programming language and a specification language, the theory of CSP helps users to understand concurrent systems, and to decide whether a program meets...
CUDA is a computing architecture designed to facilitate the development of parallel programs. In conjunction with a comprehensive software platform, the CUDA Architecture enables programmers to draw on the immense power of graphics processing units (GPUs) when building high-performance applications. GPUs, of course, have...
Dynamic Language Runtime (DLR) in .NET is a framework for designing and interacting with dynamic languages such as Python and Ruby. For the first time, the DLR places such languages on an equal footing in the .NET world with compiled languages such as C# and VB.NET. Chaur Wu’s book, Pro DLR in .NET 4,...
Use Microsoft's latest search-based technology-FAST search-to plan, customize, and deploy your search solution
FAST is Microsoft's latest intelligent search-based technology that boasts robustness and an ability to integrate business intelligence with Search. This in-depth guide provides you with advanced coverage on...
How do you turn website visitors into customers? Conversion Optimization offers practical advice on how to persuade visitors to make a buying decision -- without driving them away through data overload or tedious navigation. You'll learn how to use marketing principles, design, usability, and analytics on your site to...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
Welcome to jQuery UI Themes: Beginner's Guide. This introductory text will get you started
with developing your own themes for jQuery UI applications. Starting with the general
concepts of user interface themes, this book walks the reader through everything from
the most basic ideas in jQuery UI to more advanced topics such as icons...
Hands-On Networking Fundamentals opens the world of computer networks to you. Computer networks
arc a staple in homes, offices, and organizations. Through sharing information and resources, networks
extend the power of computers worldwide. If you are new to networking or just beginning, this book is your
chance to learn about networks...
This book is about directing diverse forces toward a unifi ed goal: the completion of a web project.
While the goal in this case is very specifi c — a Drupal website — in many ways, it outlines successful
steps for completing any life project, including Drupal itself.
I started the Drupal project in my dorm room in...
The book addresses the problem known in the literature as Open and Distance
Learning (ODL). ODL describes new concepts of the process of learning-teaching
organization. ODL is becoming very popular at universities that offer education
via online and/or distance learning, both in synchronous or asynchronous modes.
More precisely, the...
Recognizing patterns is at the core of man's attempts to understand the universe that we inhabit. Through the development of sensors and instruments, we have extended our ability to gather data far beyond the range and scale of man's natural senses. As a result we are now able to gather data on phenomena occurring in the far reaches...