Home | Amazing | Today | Tags | Publishers | Years | Search 
Neural Networks Theory
Neural Networks Theory
"Neural Networks Theory is a major contribution to the neural networks literature. It is a treasure trove that should be mined by the thousands of researchers and practitioners worldwide who have not previously had access to the fruits of Soviet and Russian neural network research. Dr. Galushkin is to be congratulated and thanked for his...
Telecom Crash Course, Second Edition
Telecom Crash Course, Second Edition
THE DEFINITIVE TELECOM RESOURCE -- COMPLETELY REVISED AND UPDATED

Get a thorough introduction to the telecommunications industry -- from the technologies involved to the complex business, market, and regulatory relationships. This new edition of the acclaimed telecom guide provides a framework for understanding the concepts,...

Packet Broadband Network Handbook
Packet Broadband Network Handbook
BROADBAND DECISION SUPPORT

One thing at least is certain about tomorrow's global communications: broadband networks will be packetized. But how exactly will we get there from here? Before all the i's get dotted and t's crossed, leaders in telecom and networking have to make some hard choices. This is the book that can...

Secure Data Management in Decentralized Systems (Advances in Information Security)
Secure Data Management in Decentralized Systems (Advances in Information Security)
The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business...
Effective IT Service Management: To ITIL and Beyond!
Effective IT Service Management: To ITIL and Beyond!
IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, every IT project and system would deteriorate over time until failure. ITIL is the recognized best-practice standard for ITSM, and has been around since the late 1980s, with ITIL version 3 published just recently. However, many...
Conceptual Modeling of Information Systems
Conceptual Modeling of Information Systems
When designing an information system, conceptual modeling is the activity that elicits and describes the general knowledge the system needs to know. This description, called the conceptual schema, is necessary in order to develop an information system. Recently, many researchers and professionals share a vision in which the conceptual schema...
Grid Computing Security
Grid Computing Security
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and...
Grid Computing: Software Environments and Tools
Grid Computing: Software Environments and Tools
Grid computing combines aspects from parallel computing, distributed computing and data management, and has been playing an important role in pushing forward the state-of-the-art in computer science and information technologies. There is considerable interest in Grid computing at present, with a significant number of Grid projects being launched...
Weight Training For Dummies (Health & Fitness)
Weight Training For Dummies (Health & Fitness)
When the first edition of Weight Training For Dummies was published, lifting weights was on the verge of becoming a mainstream phenomenon. Women, Baby Boomers, seniors — all these groups were starting to get the message: Hoisting hunks of iron benefits everyone, not just bodybuilders with shoulders wider than the wingspan of a DC-10.
...
Business Writing for Results : How to Create a Sense of Urgency and Increase Response to All of Your Business Communications
Business Writing for Results : How to Create a Sense of Urgency and Increase Response to All of Your Business Communications
Malcolm Forbes once said, “A good business letter can get you a job interview, get you off the hook, or get you money. It’s totally asinine to blow your chances of getting whatever you want with a business letter that turns people off instead of turning them on.”

Here’s the bottom line: If you can’t produce
...
Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)
Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)
Extreme NXT: Extending the LEGO MIDSTORMS NXT to the Next Level is for intermediate-level users of NXT who would like to advance their capabilities by learning some of the basics of electronics. Plenty of examples are provided, and easy-to-follow instructions are included for building over 15 different sensors.

This makes a great...

Websphere J2Ee Application Development for the IBM Iseries Server
Websphere J2Ee Application Development for the IBM Iseries Server
WebSphere Application Server 4.0 delivers the Java 2 Enterprise Edition (J2EE) implementation. It is the IBM strategic Web application server and a key IBM iSeries product for enabling e-business applications. The iSeries server and WebSphere Application Server are a perfect match for hosting e-business applications. You can build J2EE applications...
Result Page: 2325 2324 2323 2322 2321 2320 2319 2318 2317 2316 2315 2314 2313 2312 2311 2310 2309 2308 2307 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy