Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)

The “Bible” for Rails Development: Fully Updated for Rails 5

 

“When I read The Rails Way for the first time, I felt like I truly understood Rails for the first time.”

...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

Ethernet Networks: Design, Implementation, Operation,& Management
Ethernet Networks: Design, Implementation, Operation,& Management
Ethernet Networks, Fourth Edition, provides everything you need to know to plan, implement, manage and upgrade Ethernet networks.
  • Improve your skills in employing Ethernet hubs, switches, and routers.

  • Learn how to set up and operate a wireless Local Area Network (LAN).

    ...
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
Whether monitoring the Internet for threats and chatter, capturing computer evidence, or crunching forensic data, Guidance Software's EnCase computer forensics software is recognized as the premier computer forensics tool on the market. For investigation professionals, EnCE certification tells the world that you've not only mastered the use of...
Electrician's Pocket Manual (Pocket References (McGraw-Hill))
Electrician's Pocket Manual (Pocket References (McGraw-Hill))
Complete, compact and featuring formulas, tables, and diagrams in place of lengthy text descriptions, this handy reference delivers job-essential information in a quick look-up format. The new Second edition has been updated to include the 2005 National Electrical Code, new symbols for electrical drafting now being used in CAD drafting, additional...
Fundamentals of Digital Communication
Fundamentals of Digital Communication
The field of digital communication has evolved rapidly in the past few decades, with commercial applications proliferating in wireline communication networks (e.g., digital subscriber loop, cable, fiber optics), wireless communication (e.g., cell phones and wireless local area networks), and storage media (e.g., compact discs, hard drives). The...
The Radio Station, Seventh Edition: Broadcast, Satellite & Internet
The Radio Station, Seventh Edition: Broadcast, Satellite & Internet
Keith's masterful updated survey of what has changed and what remains the same in the dynamic audio industry.
- Christopher Sterling,
George Washington University

The bible for beginning radio professionals. A complete guide to the internal workings of radio stations and the radio industry. The book is now a
...
Internetworking Troubleshooting Handbook (2nd Edition)
Internetworking Troubleshooting Handbook (2nd Edition)
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Next Generation Network Services: Technologies & Strategies
Next Generation Network Services: Technologies & Strategies
'Next Generation' refers to the new technologies and services that telecommunications operators will have at their disposal as they create new 3G networks where voice and data converge and which are based on packet switched rather than circuit switched telephony.

Providing a much needed overview of the latest communication technologies
...
ESD Basics: From Semiconductor Manufacturing to Product Use
ESD Basics: From Semiconductor Manufacturing to Product Use

Electrostatic discharge (ESD) continues to impact semiconductor manufacturing, semiconductor components and systems, as technologies scale from micro- to nano electronics. This book introduces the fundamentals of ESD, electrical overstress (EOS), electromagnetic interference (EMI), electromagnetic compatibility (EMC), and latchup, as well as...

Result Page: 16 15 14 13 12 11 10 9 8 7 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy