|
|
|
|
|
UNIX: The Complete Reference, Second EditionGet cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second... | | Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... | | Modern Quantum MechanicsRevised edition includes discussions of fundamental topics and newer developments such as neutron interferometer experiments, Feynman path integrals, correlation measurements, and Bell's inequality. DLC: Quantum theory.
J. J. Sakurai was always a very welcome guest here at CERN, for he was one of those rare theorists to whom the... |
|
DSL AdvancesCutting-edge xDSL: technology, standards, architecture, regulation, and its application.
- The state of the art in DSL technology, standards, and architecture
- ADSL, HDSL2, SHDSL, VDSL, line unbundling, spectrum management, and more
- Voice over DSL and video-on-demand: technical progress and its impact...
| | Telephone Projects for the Evil Genius
Since its inception in 1876, the telephone has captured the imagination of people around the world. From its simple origins, the telephone has evolved from the humble device it once was to the modern cell phone or satellite phone. The telephone has fundamentally and instantaneously changed the human race’s ability to communicate over... | | Professional Microsoft Smartphone Programming"Professor Yang and Dr. Zheng are two of the passionate young researchers in the field with a lot of hands-on experience. Professor Ni, on the other hand, is a veteran in wireless technologies, 2.5G/3G cellular phones, and embedded systems. The energy, the hands-on experience, and the long-term vision ensure that the book is of highest... |
|
C Traps and PitfallsC Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for... | | Expert MySQLSince the enormous number of new features made available with MySQL release 5.0, MySQL has been gaining steam as a viable alternative to database behemoths like Oracle and IBM DB2. MySQL users now have the ability to extend MySQL with new SQL commands, optimize query execution, and embed MySQL within low-resource environments like embedded devices... | | Flex 3 in ActionNew Web applications require engaging user-friendly interfaces-and the cooler, the better. With Flex 3, Web developers at any skill level can create high-quality, effective, and interactive Rich Internet Applications (RIAs) quickly and easily. Flex removes the complexity barrier from RIA development by offering sophisticated tools and a... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |