Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Server 2008 TCP/IP Protocols and Services
Windows Server 2008 TCP/IP Protocols and Services
This book is a straightforward discussion of the concepts, principles, and processes of many protocols in the TCP/IP protocol suite and how they are supported by Windows Server 2008 and Windows Vista. The focus of this book is on Internet Protocol version 4 (IPv4), referred to as Internet Protocol (IP), and associated transport and network...
Microsoft Visual Studio 2008 Unleashed
Microsoft Visual Studio 2008 Unleashed
Microsoft® Visual Studio 2008 Unleashed is an end-to-end, deep dive into the Visual Studio development environment. It’s meant to provide you guidance on how you can squeeze the ultimate productivity out of the many features built into the .NET development tools. Understanding how to use your tools will make you a better...
Web Publishing with Acrobat/PDF
Web Publishing with Acrobat/PDF
Although the World Wide Web is enjoying enormous growth rates, many Web publishers have discovered that HTML is not up to the requirements of modern corporate communication. For them, Adobe Acrobat offers a wealth of design possibilities. The close integration of Acrobat in the World Wide Web unites the structural advantages of HTML with the...
H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia
H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia

Following on from the successful MPEG-2 standard, MPEG-4 Visual is enabling a new wave of multimedia applications from Internet video streaming to mobile video conferencing. The new H.264 ‘Advanced Video Coding’ standard promises impressive compression performance and is gaining support from developers and manufacturers. The first...

Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Digital Citizenship: The Internet, Society, and Participation
Digital Citizenship: The Internet, Society, and Participation
Just as education has promoted democracy and economic growth, the Internet has the potential to benefit society as a whole. Digital citizenship, or the ability to participate in society online, promotes social inclusion. But statistics show that significant segments of the population are still excluded from digital citizenship.

The
...
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
With the maturing of mobile portable telephony and the emerging broadband access market, greater fiber transmission capacity will be essential in the early 21st century. Since the demand for more capacity drives the development of new optics-based technologies, fiber optics therefore remains a vibrant area for research. Mathematical Principles of...
Traffic Grooming for Optical Networks: Foundations, Techniques and Frontiers (Optical Networks)
Traffic Grooming for Optical Networks: Foundations, Techniques and Frontiers (Optical Networks)
Traffic grooming is the name given to a family of optical network design problems that has attracted significant attention from both academia and industry in the last decade or so. The huge bandwidth of fiber optical networking is much larger than the typical bandwidth demands experienced by network service providers. This mismatch creates a need...
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Absolute Beginner's Guide to Keynote for Mac OS X
Absolute Beginner's Guide to Keynote for Mac OS X
Priced at $99, Keynote is the new application that promises to bring to everyone the ability to create stunning, professional-quality presentations. It includes professionally designed themes, top-end typography, animated charts and tables, and cinematic quality transitions. Keynote has Apple's traditional elegance and ease-of-use, with intuitive...
Digital Telephony (Wiley Series in Telecommunications and Signal Processing)
Digital Telephony (Wiley Series in Telecommunications and Signal Processing)

From the reviews of the Second Edition ...

"The book stresses how systems operate and the rationale behind their design, rather than presenting rigorous analytical formulations ... [It provides] the practicality and breadth essential to mastering the concepts of modern communications systems." -Telecommunication Journal...

Higher Creativity for Virtual Teams: Developing Platforms for Co-Creation (Premier Reference)
Higher Creativity for Virtual Teams: Developing Platforms for Co-Creation (Premier Reference)
Virtual teams constitute a relatively new knowledge area that has risen from two recent changes: the globalization of industry and markets, and advances in information communication technology tools. Continual technological advancement is set against a backdrop of international mergers, take-overs, and alliances, which invariably leads to more...
Result Page: 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy