Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Mesh Networking
Wireless Mesh Networking
A Complete Roadmap to Wireless Mesh Network Design Principles and Practices Using WiFi, WiMAX, and ZigBEE!

Wireless Mesh Networking provides everything needed to create in-demand wireless mesh networks that provide wireless broadband access over wide areas. This resource presents a complete roadmap to the design and...

Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

MySQL Clustering
MySQL Clustering

Clustering is the final component of MySQL that makes it truly enterprise-level and able to compete fully with proprietary databases such as Oracle and Microsoft SQL Server. The increased number of high-demand, high-productivity corporations and institutions choosing MySQL, including MIT, the Department of Homeland Security,...

DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and Exam Prep (6th Edition)
DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and Exam Prep (6th Edition)

Today’s business leaders agree that effectively managing and leveraging information to make decisions has never been more important. More than 60 percent of CEOs feel their organizations need to do better at leveraging their information (IBM® Attributes and Capabilities Study, 2005). CFOs feel that if they leverage their information...

Integration of Alternative Sources of Energy
Integration of Alternative Sources of Energy
Our goal in writing this book was to discuss the ‘‘electrical side’’ of alternative energy sources. From the beginning, we felt that this approach would be a challenge that would be very difficult to fulfill. Most of the current technical work explores just one or two types of alternative energy sources, but the integration...
Erlang and OTP in Action
Erlang and OTP in Action

For a long time, the world of Erlang programming had only one book—The Book,1 released in 1993 and revised in 1996. Fanatics can still find it in print, at a price of over $100. A decade or so after its publication, The Book was getting long in the tooth, to say the least. The language had evolved to include several new and...

Citrix® XenMobile™ Mobile Device Management
Citrix® XenMobile™ Mobile Device Management

Get up to speed with mobile device management with this fantastic, fully illustrated guide to XenMobile. From security to package deployment, it's an essential companion for the current trend of BYOD and corporate mobile devices.

Overview

  • Deploy and manage the complete XenMobile solution
  • ...
Data Mining Patterns: New Methods and Applications
Data Mining Patterns: New Methods and Applications
Since its definition a decade ago, the problem of mining patterns is becoming a very active research area, and efficient techniques have been widely applied to problems either in industry, government or science. From the initial definition and motivated by real applications, the problem of mining patterns not only addresses the finding of itemsets...
American Indian Biographies (Magill's Choice)
American Indian Biographies (Magill's Choice)
This volume is a revised and expanded edition of Salem Press’s American Indian Biographies, which was published in 1999. The majority of the essays in that first edition were taken from Salem’s Ready Reference: American Indians (1995), and 32 new essays were added. American Indian Biographies, Revised Edition includes all the subjects...
Teach Yourself Cobol in 21 Days (Sams Teach Yourself)
Teach Yourself Cobol in 21 Days (Sams Teach Yourself)
Sams Teach Yourself COBOL in 21 Days provides the necessary information needed to successfully enter the next century. . You'll find complete coverage of the syntax, standards, and programming of COBOL-putting you on the right track to the Year 2000 With the help of a programming expert, you will master the features of COBOL and learn to update...
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

unlimited object storage image
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy