 |
|
 SIP TrunkingThe first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions
Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a... |  |  Microsoft SQL Server 2008 Reporting Services Unleashed
The authoritative, example-rich guide to Microsoft’s powerful reporting platform
With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL... |  |  Construction Stakeholder ManagementThis book captures best practice in construction stakeholder management using a range of international case studies. It demonstrates stakeholder mapping, presents the power/interest matrix and analyses a model for the timely engagement of stakeholders.
The increased use of partnering and other relational forms of contracting have... |
|
 Clocking in Modern VLSI Systems (Integrated Circuits and Systems)The purpose of Clocking in Modern VLSI Systems is to provide a concise exposition of all major issues in clocking large state-of-the-art microprocessors and SoCs. The issues covered include clock generation and distribution, clocking elements, testability, alternative clocking styles, special techniques, and dealing with scaling and... |  |  3D Images of Materials Structures: Processing and AnalysisTaking and analyzing images of materials' microstructures is essential for quality control, choice and design of all kind of products. Today, the standard method still is to analyze 2D microscopy images. But, insight into the 3D geometry of the microstructure of materials and measuring its characteristics become more and more prerequisites in... |  |  Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting... |
|
 Voice over IP SecurityVoice over IP Security
Security best practices derived from deep analysis of the latest VoIP network threats
Patrick Park
VoIP... |  |  Fourier Analysis on Finite Abelian Groups (Applied and Numerical Harmonic Analysis)Fourier analysis has been the inspiration for a technological wave of advances in fields such as imaging processing, financial modeling, algorithms and sequence design. This unified, self-contained book examines the mathematical tools used for decomposing and analyzing functions, specifically, the application of the [discrete] Fourier transform... |  |  |
|
 Mathematics for the Physical Sciences
Advanced undergraduates and graduate students in the natural sciences receive a solid foundation in several fields of mathematics with this text. Topics include vector spaces and matrices; orthogonal functions; polynomial equations; asymptotic expansions; ordinary differential equations; conformal mapping; and extremum problems. ... |  |  Professional Penetration Testing: Creating and Operating a Formal Hacking LabSave yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!
Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a... |  |  Visual Basic.NET How to Program, Second EditionFor introductory and intermediate courses on Visual Basic programming offered in departments of Computer Science, CIS, MIS, IT, Business, Engineering, and Continuing Education. Teach Visual Basic .NET programming from the ground up! The introduction of Microsoft's .NET Framework marks the beginning of major revisions to all of Microsoft's... |
|
Result Page: 552 551 550 549 548 547 546 545 544 543 542 541 540 539 538 537 536 535 534 |