Home | Amazing | Today | Tags | Publishers | Years | Search 
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement,...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Advanced Calculus
Advanced Calculus
New publisher! Corrected version! Demonstrating analytical and numerical techniques for attacking problems in the application of mathematics, this well-organized, clearly written text presents the logical relationship and fundamental notations of analysis. Buck discusses analysis not solely as a tool, but as a subject in its own right. This...
RF Photonic Technology in Optical Fiber Links
RF Photonic Technology in Optical Fiber Links
RF photonic components, transmission systems, and signal processing examples in optical fibers are reviewed by leading academic, government, and industry scientists working in this field. This volume introduces various related technologies such as direct modulation of laser sources, external modulation techniques, and detectors. The text is aimed...
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

Bio-inspired Algorithms for the Vehicle Routing Problem (Studies in Computational Intelligence)
Bio-inspired Algorithms for the Vehicle Routing Problem (Studies in Computational Intelligence)
The vehicle routing problem (VRP) is one of the most famous combinatorial optimization problems. In simple terms, the goal is to determine a set of routes with overall minimum cost that can satisfy several geographical scattered demands. Biological inspired computation is a field devoted to the development of computational tools modeled after...
Security and Software for Cybercafes (Premier Reference Source)
Security and Software for Cybercafes (Premier Reference Source)
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information,...
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
A software testing survival guide to deliver winning Internet-based applications

Accessibility, reliability, availability, and security of Web applications on all types of platforms are key to winning business and customers. The technol-ogy continues to change at a fast pace, and savvy end-users are demanding products and services with fewer...

Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
C: An advanced introduction (Principles of computer science series)
C: An advanced introduction (Principles of computer science series)
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
Wavelets and Their Applications (Digital Signal and Image Processing series)
Wavelets and Their Applications (Digital Signal and Image Processing series)
Showing how wavelets combine signal in image processing, mathematics, physics, and electrical engineering, this introduction to wavelet technology helps engineers master the basic techniques for using wavelets in such applications as image compression, turbulence, human vision, radar, and earthquake prediction. Among the topics covered are the...
The iPhone Developer's Cookbook: Building Applications with the iPhone SDK (Developer's Library)
The iPhone Developer's Cookbook: Building Applications with the iPhone SDK (Developer's Library)
The iPhone and iPod touch aren’t just attracting millions of new users; their breakthrough development platform enables programmers to build tomorrow’s killer applications. If you’re getting started with iPhone programming, this book brings together tested, ready-to-use code for hundreds of the challenges you’re most likely...
Result Page: 622 621 620 619 618 617 616 615 614 613 612 611 610 609 608 607 606 605 604 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy