Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Adobe Photoshop Elements 8 for Photographers
Adobe Photoshop Elements 8 for Photographers

If you're new to Elements and need a complete overview of each feature and function, you'll find exactly what you're looking for here: step-by-step instructions covering every aspect of Elements, accompanied by helpful screenshots and colorful images. If you're a more experienced user, you'll find Philip's signature...

The Verilog® Hardware Description Language
The Verilog® Hardware Description Language

The Verilog language is a hardware description language that provides a means of specifying a digital system at a wide range of levels of abstraction. The language supports the early conceptual stages of design with its behavioral level of abstraction, and the later implementation stages with its structural abstractions. The language includes...

Digital Signatures (Advances in Information Security)
Digital Signatures (Advances in Information Security)

As a beginning graduate student, I recall being frustrated by a general lack of accessible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren’t there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my...

The Design and Analysis of Parallel Algorithms
The Design and Analysis of Parallel Algorithms

This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...

HTML5 and CSS3: Develop with Tomorrow's Standards Today (Pragmatic Programmers)
HTML5 and CSS3: Develop with Tomorrow's Standards Today (Pragmatic Programmers)

HTML5 and CSS3 are the future of web development, but you don't have to wait to start using them. Even though the specification is still in development, many modern browsers and mobile devices already support HTML5 and CSS3. This book gets you up to speed on the new HTML5 elements and CSS3 features you can use right now, and...

IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
Moodle 2 Administration
Moodle 2 Administration
Moodle has evolved from an academic project to the world's most popular Virtual Learning Environment (VLE). During this evolution, its complexity has risen dramatically and so have the skills that are required to administer the system.

Moodle 2 Administration is a complete, practical guide for administering Moodle
...
The Mathematica Book, Fifth Edition
The Mathematica Book, Fifth Edition

As both a highly readable tutorial and a definitive reference for over a million Mathematica users worldwide, this book covers every aspect of Mathematica. It is an essential resource for all users of Mathematica from beginners to experts. This expanded fifth edition presents Mathematica Version 5 for the first time and is important for...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends
Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends
Current and future mobile terminals become increasingly complex because they have to deal with a variety of frequency bands and communication standards. Achieving multi-band/multi-mode functionality is especially challenging for the radio frequency (RF)-transceiver section, due to limitations in terms of frequency-agile RF components...
A Probability Path (Modern Birkhäuser Classics)
A Probability Path (Modern Birkhäuser Classics)

Many probability books are written by mathematicians and have the built-in bias that the reader is assumed to be a mathematician coming to the material for its beauty. This textbook is geared towards beginning graduate students from a variety of disciplines whose primary focus is not necessarily mathematics for its own sake. Instead,...

unlimited object storage image
Result Page: 510 509 508 507 506 505 504 503 502 501 500 499 498 497 496 495 494 493 492 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy