 |
|
 Cdma Mobile Radio Design (Artech House Telecommunications Library)
Wireless communications is growing at a phenomenal rate. From 1991 to
1999, the number of subscribers increased from about 25 million to over 250
million. Incredibly, over the next seven years, the number. of subscribers is
expected to quadruple, to over 1 billion [ 1]. That growth rate is faster than
that of any other consumer... |  |  Adobe Photoshop Lightroom 4 Classroom in a Book
Adobe® Photoshop® Lightroom® delivers a complete workflow solution for the
digital photographer—from importing, reviewing, organizing, and enhancing
digital images to publishing photos, producing client presentations, creating
photo books and web galleries, and outputting high-quality prints. The user... |  |  Adobe Flash Professional CS6 Classroom in a Book
Adobe Flash Professional CS6 provides a comprehensive authoring environment for creating interactive and media-rich applications. Flash is widely used to create engaging projects integrating video, sound, graphics, and animation. You can create original content in Flash or import assets from other Adobe... |
|
|
 Adobe InDesign CS6 Classroom in a Book
Welcome to Adobe® InDesign® CS6, a powerful design and production application
that offers precision, control, and seamless integration with other Adobe professional
graphics software. Using InDesign, you can produce professional-quality, full-color
documents on high-volume color printing presses, or print to a range of... |  |  Logic of Analog and Digital Machines
Computer Science is a very young discipline compared to most others. Alan Turing
published the seminal paper of the field in 1936. Around the same time, the militaries in
Germany, UK, and US commissioned the first digital electronic computer projects. One of
these, the Colossus at Bletchley Park in the UK, was used to break the... |  |  |
|
 Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky ... |  |  Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology
In Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology, Jim Weaver, Weiqi Gao, Stephen Chin, Dean Iverson, and Johan Vos show you how you can use the JavaFX platform to create rich-client Java applications. You'll see how JavaFX provides a powerful Java-based UI platform capable... |  |  CCNP Security IPS 642-627 Official Cert Guide
Learn, prepare, and practice for exam success
CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns,... |
|
Result Page: 754 753 752 751 750 749 748 747 746 745 744 743 742 741 740 739 738 737 736 |