Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)
Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)

The Software Communications Architecture (SCA) establishes an implementation-independent framework for the development of Joint Tactical Radio System software configurable radios. It specifies the Operating Environment, services and interfaces that applications use.

Software Defined Radio: The Software...

RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

The Handbook of Banking Technology
The Handbook of Banking Technology
Competitive advantage in banking comes from effective use of technology

The Handbook of Banking Technology provides a blueprint for the future of banking, with deep insight into the technologies at the heart of the industry. The rapid evolution of IT brings continual change and demand for investment — yet...

Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
Web Accessibility: Web Standards and Regulatory Compliance
Web Accessibility: Web Standards and Regulatory Compliance

The power of the Web lies in the fact that anyone and everyone can access it, and this should also extend to users with disabilities. Accessibility is about making websites accessible to those with aural, visual, or physical disabilities, or rather, constructing websites that don't exclude these people from accessing the content or services...

Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Antenna Design for Mobile Devices (Wiley - IEEE)
Antenna Design for Mobile Devices (Wiley - IEEE)

Expanded and updated, this practical guide is a one-stop design reference containing all an engineer needs when designing antennas

  • Integrates state-of-the-art technologies with a special section for step-by-step antenna design
  • Features up-to-date bio-safety and electromagnetic compatibility regulation...
Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

The Firebird Book: A Reference for Database Developers
The Firebird Book: A Reference for Database Developers

The Firebird Book: A Guide for Database Developers is a comprehensive, practical guide for developing client/server FirebirdSQL database applications for small and large networks of users. FirebirdSQL is an open source database, and while not as popular as MySQL or PostgreSQL, it has a dedicated following, and has far more advanced features.

...
Posix Programmers Guide
Posix Programmers Guide
This guide, intended as an explanation of the POSIX standard and as a reference for the POSIX.1 programming library, helps you write more portable programs. Most UNIX systems today are POSIX compliant because the federal government requires it for its purchases. Even OSF and UI agree on support for POSIX. Unfortunately, given the manufacturer's...
unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy