Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IP Communications and Services for NGN
IP Communications and Services for NGN

Rapid deployment and acceptance of broadband networks, including the 802.11 a/b/g, 3G cellular networks, WiMAX, and emerging 4G cellular IP networks, have sparked a growing reliance on voice over IP and the quickly emerging IP TV and Mobile TV. Providing the necessary background and technical understanding to stay abreast of and even ahead of...

Creating Components
Creating Components
This text describes how concurrency works, how to more effectively deploy it in program components, and how to reuse these components to improve program design, quality, and performance.

Concurrency is a powerful technique for developing efficient and lightning- fast software. For instance, concurrency can be used in common applications...

Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications
Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications
Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications offers the latest techniques, solutions, and support regarding the design and performance of ad hoc wireless networks. This book presents the fundamentals of wireless networks, covering Bluetooth, IrDA, HomeRF, WiFi, WiMax, wireless Internet, and Mobile IP. Each chapter...
CAD and GIS Integration
CAD and GIS Integration

When used together effectively, computer-aided design (CAD) and geospatial information systems (GIS) have a solid track record for streamlining decision making and reducing inefficiencies in the design, planning, and execution of critical operations and projects. And a growing number of engineering tasks in numerous fields—including...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Delivering Successful Projects with TSP(SM) and Six Sigma: A Practical Guide to Implementing Team Software Process(SM)
Delivering Successful Projects with TSP(SM) and Six Sigma: A Practical Guide to Implementing Team Software Process(SM)
This book gives an overview of Team Software ProcessSM (TSPSM) and real-world details about my experience in successfully implementing TSP and Six Sigma in Microsoft. It also shows how geographically widely distributed new teams were able to deliver on time a very high quality product (two thirds of them with zero defects) with a decent...
Design Science Research Methods and Patterns: Innovating Information and Communication Technology
Design Science Research Methods and Patterns: Innovating Information and Communication Technology
Design research promotes understanding of advanced, cutting-edge information systems through the construction and evaluation of these systems and their components. Since this method of research can produce rigorous, meaningful results in the absence of a strong theory base, it excels in investigating new and even speculative technologies, offering...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)
PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)

PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiple-choice practice questions in each of the ten knowledge areas and in the...

Application Servers for E-Business
Application Servers for E-Business

Application Servers for E-Business presents a comprehensive overview of the technologies related to application servers in their facilitation of E-business. These technologies includes CORBA, Java, Enterprise Java Beans, Java 2, web servers, and legacy systems. It explores the role these servers play in the modern enterprise IT infrastructure...

The Complete Project Management Office Handbook, Second Edition (Esi International Project Management Series)
The Complete Project Management Office Handbook, Second Edition (Esi International Project Management Series)
The Complete Project Management Office Handbook, Second Edition identifies the PMO as the essential business integrator of the people, processes, and tools that manage or influence project performance. This book details how the PMO applies professional project management practices and successfully integrates business interests with...
Cyber Crime Investigator's Field Guide, Second Edition
Cyber Crime Investigator's Field Guide, Second Edition
In the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy