 |
|
 The VLSI Handbook, Second Edition (Electrical Engineering Handbook)We are most gratified to find that the first edition of The VLSI Handbook (2000) was well received and is widely used. Thus, we feel that our original goal of providing in-depth professional-level coverage of VLSI technology was, indeed, worthwhile. Seven years is a short time in terms of development of science and technology; however as this... |  |  A Programmer's Introduction to C# 2.0, Third EditionC# is one of the most exciting languages we’ve worked on and with. Most languages have strengths and weaknesses, but once in a while a new language comes along that meshes well with the hardware, software, and programming approaches of a specific time. We believe C# is such a language. Of course, language choice is often a “religious... |  |  Event-Based Programming: Taking Events to the LimitLanguages like C#, VB .NET, and Delphi include built-in support for events, and these events become very powerful when they connect the objects and components of a system. Events make it possible for such parts to interact without any coupling. And the resulting parts can be developed and tested individually--which keeps the code clean and... |
|
|
 QoS and QoE Management in UMTS Cellular SystemsThis comprehensive volume provides state-of-the art guidance on Quality of Service (QoS) and Quality of end-user Experience (QoE) management in UMTS cellular systems, tackling planning, provisioning, monitoring and optimisation issues in a single accessible resource. In addition, a detailed discussion is provided on service applications, QoS... |  |  The IMS: IP Multimedia Concepts and ServicesThe IMS: IP Multimedia Concepts and Services, Second Editionbuilds on the success of the previous best-selling edition, providing comprehensive coverage of IMS – its concepts, architecture, protocols and functionalities with a wealth of new and updated material. Mobile telephony with the current technology has been hugely... |  |  Professional Pen Testing for Web Applications (Programmer to Programmer)There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical... |
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 |