Home | Amazing | Today | Tags | Publishers | Years | Search 
Spread Spectrum and CDMA: Principles and Applications
Spread Spectrum and CDMA: Principles and Applications
Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.

This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT,...

SOA Using Java(TM)  Web Services
SOA Using Java(TM) Web Services
Expert Solutions and State-of-the-Art Code Examples

SOA Using Java Web Services is a hands-on guide to implementing Web services and Service Oriented Architecture (SOA) with today’s Java EE 5 and Java SE 6 platforms. Author Mark Hansen presents in explicit detail the information that...

Understanding IPTV (Informa Telecoms & Media)
Understanding IPTV (Informa Telecoms & Media)
Just when we thought we had mastered modern communications-related acronyms, a new one has appeared. That acronym, IPTV, which is the subject of this book, represents an emerging technology that could change the manner by which we receive home entertainment, obtain training, operate our personal computers, and even use our cell phones. The acronym...
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Why purchase expensive add-on cards or bus interfaces when you can develop effective and economical data acquisition and process controls using C programs? Using the under-employed printer adapter (that is, the parallel port of your PC), you can turn your computer into a powerful tool for developing microprocessor applications. Learn how to build a...
Demystifying EDI (With CD-ROM)
Demystifying EDI (With CD-ROM)
Most of today's mid-size to large business enterprises and governmental agencies use electronic data interchange, or EDI, to interact with one another. EDI is a highly structured data communications system that is used to exchange commercial documents including purchase orders, invoices, electronic catalogs, and bid documents. Demystifying EDI is...
Ultra Wideband Wireless Communication
Ultra Wideband Wireless Communication
An international panel of experts provide major research issues and a self-contained, rapid introduction to the theory and application of UWB

This book delivers end-to-end coverage of recent advances in both the theory and practical design of ultra wideband (UWB) communication networks. Contributions offer a worldwide perspective
...
Embedded Systems Building Blocks: Complete and Ready-to-Use Modules in C
Embedded Systems Building Blocks: Complete and Ready-to-Use Modules in C
- This second edition features revisions that support the latest version of the author's popular operating system and book, MicroC/OS-II - Complete and ready-to-use modules in C Get a clear explanation of functional code modules and microcontroller theory

You get hands-on experience with real-time system modules provided by the author
...
Programming Windows Workflow Foundation: Practical WF Techniques and Examples using XAML and C#
Programming Windows Workflow Foundation: Practical WF Techniques and Examples using XAML and C#
A fast-paced and practical developer's road map to working with Windows WF, from compilation to the base activity library to runtime services. Windows Workflow Foundation (WF) is a technology for defining, executing, and managing workflows. It is part of the .NET Framework 3.0 and will be available natively in the Windows Vista operating system....
Understanding Digital Signal Processing (2nd Edition)
Understanding Digital Signal Processing (2nd Edition)
Amazon.com's top-selling DSP book for 5 straight years-now fully updated!

Real-world DSP solutions for working professionals!

Understanding Digital Signal Processing, Second Edition is quite simply the best way for engineers, and other technical professionals, to master and apply DSP techniques. Lyons has updated and expanded his...

Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Remoting Patterns: Foundations of Enterprise, Internet and Realtime Distributed Object Middleware
Remoting Patterns: Foundations of Enterprise, Internet and Realtime Distributed Object Middleware
Remoting offers developers many ways to customize the communications process, for efficiency, security, performance and power, and allows seamless integration of components running on several computers into a single application. This book exposes the full power of remoting to developers working in mixed platform environments in a way that will...
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare,...
Result Page: 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy