 |
|
 Heterogeneous Cellular Networks
A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks
The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE... |  |  Laws of Small Numbers: Extremes and Rare Events
Since the publication of the first edition of this seminar book in 1994, the theory and applications of extremes and rare events have enjoyed an enormous and still increasing interest. The intention of the book is to give a mathematically oriented development of the theory of rare events underlying various applications. This characteristic of... |  |  Professional Embedded ARM Development
A practical Wrox guide to ARM programming for mobile devices
With more than 90 percent of mobile phones sold in recent years using ARM-based processors, developers are eager to master this embedded technology. If you know the basics of C programming, this guide will ease you into the world of embedded ARM technology. With... |
|
 Dictionary of DNA and Genome Technology
DNA technology is evolving rapidly, with new methods and a fast-growing vocabulary. This unique dictionary offers current, detailed and accessible information on DNA technology to lecturers, researchers and students throughout the biomedical and related sciences.
The third edition is a major update, with over 3000 references from... |  |  Laptops For Seniors For Dummies (For Dummies (Computer/Tech))
It's never too late to get up and running on a laptop
Just bought your first laptop and not sure where to start? Here's the book you need. Easy-to-follow instructions (plus really easy-to-read fonts!) help you unlock the most convenient and fun aspects to using a laptop. Get advice on selecting the right laptop for... |  |  |
|
 Learn Unity for 2D Game Development (Technology in Action)
2D games are everywhere, from mobile devices and websites to game consoles and PCs. Timeless and popular, 2D games represent a substantial segment of the games market.
In Learn Unity for 2D Game Development, targeted at both game development newcomers and established developers, experienced game developer Alan Thorn ... |  |  Performance Testing With JMeter 2.9
Performance testing with JMeter 2.9 is critical to the success of any software product launch and continued scalability. Irrespective of the size of the application’s user base, it’s vital to deliver the best user experience to consumers. Apache JMeter is an excellent testing tool that provides an insight into how applications... |  |  Using Game Theory to Improve Safety within Chemical Industrial Parks
Though the game-theoretic approach has been vastly studied and utilized in relation to economics of industrial organizations, it has hardly been used to tackle safety management in multi-plant chemical industrial settings. Using Game Theory for Improving Safety within Chemical Industrial Parks presents an in-depth discussion of... |
|
 Haskell Financial Data Modeling and Predictive Analytics
Haskell is one of the three most influential functional programming languages available today along with Lisp and Standard ML. When used for financial analysis, you can achieve a much-improved level of prediction and clear problem descriptions.
Haskell Financial Data Modeling and Predictive Analytics is a hands-on guide that... |  |  Alfresco 4 Enterprise Content Management Implementation
Alfresco 4 has improved a lot with its new and advanced concepts for content management. Users have been waiting for a book that covers these concepts along with security, dashboards, and the configuration features of Alfresco 4.
Alfresco 4 Enterprise Content Management Implementation is a well-crafted and easy-to-use book, and it... |  |  Metasploit Penetration Testing Cookbook, Second Edition
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in... |
|
Result Page: 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 |