Home | Amazing | Today | Tags | Publishers | Years | Search 
SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

Microsoft SQL Server 2008 Reporting Services Unleashed
Microsoft SQL Server 2008 Reporting Services Unleashed

The authoritative, example-rich guide to Microsoft’s powerful reporting platform

With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL...

Construction Stakeholder Management
Construction Stakeholder Management

This book captures best practice in construction stakeholder management using a range of international case studies. It demonstrates stakeholder mapping, presents the power/interest matrix and analyses a model for the timely engagement of stakeholders.

The increased use of partnering and other relational forms of contracting have...

Clocking in Modern VLSI Systems (Integrated Circuits and Systems)
Clocking in Modern VLSI Systems (Integrated Circuits and Systems)

The purpose of Clocking in Modern VLSI Systems is to provide a concise exposition of all major issues in clocking large state-of-the-art microprocessors and SoCs. The issues covered include clock generation and distribution, clocking elements, testability, alternative clocking styles, special techniques, and dealing with scaling and...

3D Images of Materials Structures: Processing and Analysis
3D Images of Materials Structures: Processing and Analysis

Taking and analyzing images of materials' microstructures is essential for quality control, choice and design of all kind of products. Today, the standard method still is to analyze 2D microscopy images. But, insight into the 3D geometry of the microstructure of materials and measuring its characteristics become more and more prerequisites in...

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)

For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting...

Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Fourier Analysis on Finite Abelian Groups (Applied and Numerical Harmonic Analysis)
Fourier Analysis on Finite Abelian Groups (Applied and Numerical Harmonic Analysis)

Fourier analysis has been the inspiration for a technological wave of advances in fields such as imaging processing, financial modeling, algorithms and sequence design. This unified, self-contained book examines the mathematical tools used for decomposing and analyzing functions, specifically, the application of the [discrete] Fourier transform...

Understanding Virtual Reality: Interface, Application, and Design (The Morgan Kaufmann Series in Computer Graphics)
Understanding Virtual Reality: Interface, Application, and Design (The Morgan Kaufmann Series in Computer Graphics)

Understanding Virtual Reality arrives at a time when the technologies behind virtual reality have advanced to the point that it is possible to develop and deploy meaningful, productive virtual reality applications. The aim of this thorough, accessible exploration is to help you take advantage of this moment, equipping you with the...

Mathematics for the Physical Sciences
Mathematics for the Physical Sciences
Advanced undergraduates and graduate students in the natural sciences receive a solid foundation in several fields of mathematics with this text. Topics include vector spaces and matrices; orthogonal functions; polynomial equations; asymptotic expansions; ordinary differential equations; conformal mapping; and extremum problems....
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!

Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a...

Visual Basic.NET How to Program, Second Edition
Visual Basic.NET How to Program, Second Edition

For introductory and intermediate courses on Visual Basic programming offered in departments of Computer Science, CIS, MIS, IT, Business, Engineering, and Continuing Education. Teach Visual Basic .NET programming from the ground up! The introduction of Microsoft's .NET Framework marks the beginning of major revisions to all of Microsoft's...

Result Page: 552 551 550 549 548 547 546 545 544 543 542 541 540 539 538 537 536 535 534 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy