Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Persuasive Business Proposals: Writing to Win More Customers, Clients, and Contracts
Persuasive Business Proposals: Writing to Win More Customers, Clients, and Contracts

With over 40,000 copies sold, the first edition of Persuasive Business Proposals helped many readers construct dynamic, effective proposals. Now in paperback, this fully-revised second edition still gives readers simple, effective techniques for organizing, writing, and delivering proposals while updating the author’s winning...

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone

Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like...

Java How to Program, 7th Edition
Java How to Program, 7th Edition

The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. The Seventh Edition has been extensively fine-tuned and is completely up-to-date with Sun Microsystems, Inc.’s...

Chronic Fatigue Syndrome (Diseases and Disorders)
Chronic Fatigue Syndrome (Diseases and Disorders)

Examines the symptoms, treatment options, and mystery of chronic fatigue syndrome, ongoing research into its causes, and how to live with this disease.

CHARLES BEST, ONE of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the...

Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications
The convergence of computing and communications has been predicted for many years. Today's explosion of a myriad of new types of personal computing and communications devices—notebook computers, personal digital assistants, "smart" phones, two-way pagers, digital cameras and so on—has resulted in new ways for people to...
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
An organized, methodical, real-world approach to the complex process of information technology outsourcing.

McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have...

Phobias (Diseases and Disorders)
Phobias (Diseases and Disorders)
Human beings have a love/hate relationship with fear. Medals are given to valiant warriors who charge fearlessly into combat, while those who sneak around whimpering in their battle helmets are labeled cowards and in some cultures are even put to death for what is considered a war-time crime. As a whole, people generally find fear to be...
IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Audio Signal Processing for Next-Generation Multimedia Communication Systems
Audio Signal Processing for Next-Generation Multimedia Communication Systems
This book has its origins in the Multimedia Communications Research Center at Bell Laboratories. It will likely be the last thing coming from this Center, since it no longer exists. This book reflects our vision on next-generation multimedia communication systems, shared by many researchers who worked with us at a time in the last several years in...
Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

CCIE Prep Kit 350-001 Routing and Switching (Exam Guide)
CCIE Prep Kit 350-001 Routing and Switching (Exam Guide)
The CCIE Routing and Switching Exam Guide prepares you to pass the CCIE written exam. This book covers all necessary objectives for the exam with a tutorial text that is strictly exam-related and flows with minimal interruption. Key concepts are the only "notes" set apart from the text by special formatting. This series is designed to for...
MMS: Technologies, Usage and Business Models 
MMS: Technologies, Usage and Business Models 
MMS will reshape mobile communication, making it more personal, versatile, and expressive than ever before.

Drawing on the authors’ hands-on experience in developing, billing and delivering Multimedia Messaging Services (MMS), this innovative book addresses how MMS will affect existing network and...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy