Home | Amazing | Today | Tags | Publishers | Years | Search 
IP Design for Mobile Networks
IP Design for Mobile Networks

As the cellular world and the Internet converge, mobile networks are transitioning from circuit to packet and the Internet Protocol (IP) is now recognized as the fundamental building block for all next-generation communication networks. The all-IP vision provides the flexibility to deliver cost-effective services and...

Behind the Berlin Wall: East Germany and the Frontiers of Power
Behind the Berlin Wall: East Germany and the Frontiers of Power

Few historical changes occur literally overnight, but on August 13 1961 eighteen million East Germans awoke to find themselves walled in by an edifice which was to become synonymous with the Cold War: the Berlin Wall.

This new history rejects traditional, top-down approaches to Cold War politics, exploring instead how the border
...

The Unbreakable Child
The Unbreakable Child

Grim yet ultimately inspiring, this harrowing biography catalogues years of institutional abuse that took place in the Saint Thomas–Saint Vincent Orphan Asylum, a Catholic orphanage in Anchorage, Kentucky. After many years of neglect by their drug-addicted mother, Kim and her three older sisters were...

The Myth of the Rational Market: A History of Risk, Reward, and Delusion on Wall Street
The Myth of the Rational Market: A History of Risk, Reward, and Delusion on Wall Street

Chronicling the rise and fall of the efficient market theory and the century-long making of the modern financial industry, Justin Fox's The Myth of the Rational Market is as much an intellectual whodunit as a cultural history of the perils and possibilities of risk. The book brings to life the people and ideas that forged modern finance...

The Integrity of the Judge (Law, Justice and Power)
The Integrity of the Judge (Law, Justice and Power)

There is no consensus among legal scholars on the meaning of judicial integrity, nor has legal scholarship yet seen a well-articulated discussion about the normative concept of judicial integrity. This book fills this gap by developing a theory of judicial integrity that can be applied to safeguarding mechanisms. Author Jonathan Soeharno makes...

New Homelands: Hindu Communities in Mauritius, Guyana, Trinidad, South Africa, Fiji, and East Africa
New Homelands: Hindu Communities in Mauritius, Guyana, Trinidad, South Africa, Fiji, and East Africa

When the colonial slave trade, and then slavery itself, were abolished early in the 19th century, the British empire brazenly set up a new system of trade using Indian rather than African laborers. The new system of "indentured" labor was supposed to be different from slavery because the indenture, or contract, was written for an...

Access Technologies: Dsl and Cable (Executive Briefings in Key Technologies)
Access Technologies: Dsl and Cable (Executive Briefings in Key Technologies)

At the end of 2005, the Reporting Services development team had some tough decisions to make. Unlike most of the SQL Server development team, who had been working on the 2005 release for close to five years, it had only been a year and a half since we shipped the first version of Reporting Services. In that same timeframe, we shipped two service...

Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management

Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies...

Theory of Science and Technology Transfer and Applications (Systems Evaluation, Prediction and Decision-Making)
Theory of Science and Technology Transfer and Applications (Systems Evaluation, Prediction and Decision-Making)

Constructive Suggestions for Efficiently Implementing Technology Transfer

Theory of Science and Technology Transfer and Applications presents the mechanisms, features, effects, and modes of technology transfer. It addresses the measurement, cost, benefit, optimal allocation, and game theory of technology transfer,...

Cyber Situational Awareness: Issues and Research (Advances in Information Security)
Cyber Situational Awareness: Issues and Research (Advances in Information Security)

Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question can be well answered, is greatly dependent...

Infectious Disease Informatics
Infectious Disease Informatics

Infectious Diseases Informatics

Edited by

Vitali Sintchenko

The University of Sydney, Sydney, Australia

Preface.- List of contributors.- 1Informatics for Infectious Disease Research and Control.- 2 Bioinformatics of Microbial Sequences.- 3 Mining Databases for Microbial Gene Sequences.- 4 Comparative Genomics of...

Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Studies in Intelligence)
Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Studies in Intelligence)

This book provides an in-depth analysis of UK-US intelligence cooperation in the post-9/11 world.

Seeking to connect an analysis of intelligence liaison with the wider realm of Anglo-American Relations, the book draws on a wide range of interviews and consultations with key actors in both countries. The book is centred around two...

Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy