Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mrs. Lirriper's Lodgings [EasyRead Edition]
Mrs. Lirriper's Lodgings [EasyRead Edition]
"Mrs. Lirriper's Lodging" unwaveringly presents Charles Dickens' idealistic approach. It tells the story of an affectionate, humanistic lady Mrs. Emma Lirriper. She has come out of the pit of suffering and distress with new optimistic vision. The story beautifully intertwines the themes of humanism, faith in the final outcome of human...
Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Real Time UML Workshop for Embedded Systems (Embedded Technology)
Real Time UML Workshop for Embedded Systems (Embedded Technology)
"As you might expect, there are plenty of UML diagrams. Real-time UML specifications are used throughout, consistent with the purpose of the book. Designers with UML expertise who want to understand how to address real-time applications will find this book useful, as will those in the real-time world who need to understand how to bring UML...
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID...
SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)
Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)

Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large...

Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

Risk Management and Capital Adequacy
Risk Management and Capital Adequacy

A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines

For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...

The Accredited Symbian Developer Primer: Fundamentals of Symbian OS (Symbian Press)
The Accredited Symbian Developer Primer: Fundamentals of Symbian OS (Symbian Press)
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know.

The Primer explains the knowledge tested in the Accredited Symbian Developer exam, identifying and explaining the topics examined. Each of the exam's objectives is succinctly...

Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it...
Result Page: 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy