Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

Click: What Millions of People Are Doing Online and Why it Matters
Click: What Millions of People Are Doing Online and Why it Matters

What time of year do teenage girls search for prom dresses online? How does the quick adoption of technology affect business success (and how is that related to corn farmers in Iowa)? How do time and money affect the gender of visitors to online dating sites? And how is the Internet itself affecting the way we experience the world? In...

Plant Growth and Climate
Plant Growth and Climate

Evidence grows daily of the changing climate and its impact on plants and animals. Plant function is inextricably linked to climate and atmospheric carbon dioxide concentration. On the shortest and smallest scales, the climate affects the plant’s immediate environment and so directly influences physiological processes. At larger scales,...

Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites

 

Photoshop compositing has really blown up over the last few years. You see composites everywhere from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop now and
...
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X

OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.

If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...

Operating System Concepts with Java
Operating System Concepts with Java
Operating systems are an essential part of any computer system. Similarly, a course on operating systems is an essential part of any computer-science education. This field is undergoing rapid change, as computers are now prevalent in virtually every application, from games for children through the most sophisticated planning...
Coach Yourself to a New Career: 7 Steps to Reinventing Your Professional Life
Coach Yourself to a New Career: 7 Steps to Reinventing Your Professional Life

Bestselling author offers a step-by-step program to making the right choices about a new career move

Don't fear taking the leap into a new career with this seven step program from bestselling author and life coach Talane Miedaner. Whatever the situation or economic environment, Coach Yourself to a New Career gives...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

The Red Gate Guide to SQL Server Team-based Development
The Red Gate Guide to SQL Server Team-based Development

Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.

In some cases, this will mean some developers and one or two DBAs,...

Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)

Change: It’s what we expect from technology, from the PC to the web, through to HD TV. But nothing has been as disruptive as the change the iPhone and Android phones have brought. For the first time the power of a computer will fit in your hand, you are always connected to the Internet, and these devices are loaded with...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

unlimited object storage image
Result Page: 193 192 191 190 189 188 187 186 185 184 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy