|
|
|
|
|
Major Donors: Finding Big Gifts in Your Database and OnlineA winning approach to developing international fundraising strategies
Philanthropy is in a renewed golden age. People want to help, to make a difference, to ensure that the things they value will flourish. In order to capitalize on potential prospects, many nonprofit professionals focus solely on the research of, or communication with,... | | Green IT in Practice
There is a scientific consensus that we need to act rapidly to
cut carbon dioxide emissions if we are to limit the most
extreme effects of climate change. The IT sector is in a
unique position to act as a catalyst for this change. By
implementing simple efficiencies, the sector can reduce its
carbon footprint – which currently... | | Resource Allocation in Wireless Networks: Theory and Algorithms
The wireless industry is in the midst of a fundamental shift from providing voice-only services to offering customers an array of multimedia services, including a wide variety of audio, video and data communications capabilities. Future wireless networks will be integrated into every aspect of daily life, and therefore could affect our life... |
|
Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATMThe merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential.
Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that... | | Business Data Communications and Networking: A Research PerspectiveResearch in the area of data communications and networking is well and alive as this collection of contributions show. The book has received enhanced contributions from the authors that published in the inaugural volume of the International Journal of Business Data Communications and Networking (http://www.idea-group.com/ijbdcn). The chapters are... | | Information Operations PlanningInformation operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with... |
|
| | Understanding Cryptography: A Textbook for Students and PractitionersCryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a... | | Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level, Second Edition
Although LEGO MINDSTORMS NXT allows anyone to build complex inventions, there are limits to what you can do with what comes inside the box. This book shows you how to advance the NXT with more than 45 exciting projects that include creating a cool magic wand that writes words in thin air, building a remotely guided vehicle, and constructing... |
|
|
Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 |