Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Network Design Techniques: A Complete Guide For WANs and LANs, Second Edition
Practical Network Design Techniques: A Complete Guide For WANs and LANs, Second Edition
Focusing on the scientific aspect of network design, Practical Network Design Techniques uses mathematical models to illustrate important networking concepts and show how to solve many common design problems. Taking an inclusive approach, the author examines the cost and performance issues that can also be used by network analysts and designers as...
Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Wireless Mesh Networks
Wireless Mesh Networks
Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking...
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves

Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves is a practical, hands-on discussion of the software estimation, planning, and control process. This includes critical factors that impact estimates, methods for selecting and applying appropriate measures to projects, proper software sizing, and...

The Art of Software Modeling
The Art of Software Modeling
Using a multidisciplinary approach, The Art of Software Modeling covers model theory, practice, and presentation in detail. This book describes the driving need for model creation and demonstrates how to create system models. Presenting model examples of business workflows, requirements capture, and software architecture documentation, the text...
WiMAX: Taking Wireless to the MAX
WiMAX: Taking Wireless to the MAX
With market value expected to reach $5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what...
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective...

Official (ISC)2 Guide to the SSCP CBK ((Isc)2 Press)
Official (ISC)2 Guide to the SSCP CBK ((Isc)2 Press)
SSCP Certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. For anyone who is serious about becoming a leading tactician at the front lines, the (ISC)²® Systems Security Certified Practitioner (SSCP®) Certification is an absolute necessity-demanded by cutting-edge...
Wireless Sensor Networks: Architectures and Protocols
Wireless Sensor Networks: Architectures and Protocols

This book describes how to build wireless sensor networks, from the layers of communication protocols through the design of network nodes. It summarizes the multiple applications of wireless sensor networks, then discusses network device design and the requirements that foster the successful performance of these applications. The book discusses...

Effective Software Maintenance and Evolution: A Reuse-Based Approach
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Almost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are...
Information Security Fundamentals
Information Security Fundamentals

The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization’s mission by protecting its physical and financial resources, reputation, legal position,...

Knowledge Management and E-Learning
Knowledge Management and E-Learning

This work embraces two heretofore distinct fields of study, knowledge management and e-learning. In order to understand the impetus to link these two fields by a common thread, it is necessary to understand the two fields and the focus of each.

Knowledge management (KM) has developed as a field from its roots in data and...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy