Home | Amazing | Today | Tags | Publishers | Years | Search 
Designing Embedded Communications Software
Designing Embedded Communications Software

Create network communications software with a thorough understanding of the essential system-level design and implementation choices and how they affect the performance and maintainability of your embedded system. An examination of the OSI 7-layer model serves as a starting point for a logical partitioning of software functionality in a...

Sams Teach Yourself ADO.NET in 24 Hours
Sams Teach Yourself ADO.NET in 24 Hours

ADO.NET is the data access model built into the .NET Framework. It replaces the old (and largely successful) ADO used in almost all Visual Basic and ASP applications built over the last few years. ADO.NET enables an application to communicate with any OLE database source (including Oracle, Sybase, Microsoft Access, and even text files). This...

Lotus Notes and Domino 6 Programming Bible
Lotus Notes and Domino 6 Programming Bible
"This unmatched book is a must-have reference for Notes and Domino developers."
– John Hawkins, Editorial Director,
Lotus Advisor Magazine & Conference

If Lotus Notes and Domino 6 can do it, you can do it too...

Whether you’re an architect, developer, or administrator, this guidebook...

Network Security: A Beginner's Guide
Network Security: A Beginner's Guide

Learn network security basics using this practical guide

Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to...

Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical...
Tricks of the Podcasting Masters
Tricks of the Podcasting Masters

Have you figured out the basics of making a podcast, but now want to make a great podcast, and possibly make some money? Tricks of the Podcasting Masters holds the answers to questions such as:

  • How do I interact with listeners and get them to come back...

Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
Object-Oriented Software Construction (2nd Edition)
Object-Oriented Software Construction (2nd Edition)
The definitive reference on the most important new technology in software!

“While the original version of OOSC is a classic, OOSC 2/E is destined to overshadow it and all other general introductions . . . literally an epic work.” —James C. McKim, Jr., Hartford Graduate Center

“Compelling. Extremely...

Computer Vision: A Modern Approach
Computer Vision: A Modern Approach

This extraordinary book gives a uniquely modern view of computer vision. Offering a general survey of the whole computer vision enterprise along with sufficient detail for readers to be able to build useful applications, this book is invaluable in providing a strategic overview of computer vision. With extensive use of probabalistic...

Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
This book concentrates on three main challenges of video coding for mobile communications: higher coding efficiency, reduced computational complexity, and improved error resilience. Unlike other high level books and articles that focus on individual aspects in this field, this book has been designed as a quick, easy, and practical introduction to...
Designing Microsoft(r) ASP.NET Applications
Designing Microsoft(r) ASP.NET Applications
When I look down, I miss all the good stuff.
And when I look up, I just trip over things.
—Ani DiFranco

When I first heard about ASP.NET at a Microsoft author’s conference over a year ago, I
thought it might just be too good to be true. I can now create Web pages that are based
on compiled code, in one of
...
Wireless Local Loops: Theory and Applications
Wireless Local Loops: Theory and Applications
The demand for greater flexibility both in bandwidth allocation as well as in geographical terms has opened up the new application area of Wireless Local Loops (WLL). WLL provide a telephone system where subscribers are connected to the Public Switches Telephone Network (PSTN) using radio signals rather than copper wire for part or all of the...
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy