Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
"I commend this book to you as your springboard to the future of how to make the Net work."
-from the Foreword by Simon Phipps, Chief Technology Evangelist, Sun Microsystems, Inc.

This hands-on developer's guide to Web services prepares you for the next level of distributed computing. The authors clearly show
...
Programming Google App Engine (Animal Guide)
Programming Google App Engine (Animal Guide)

As one of today's cloud computing services, Google App Engine does more than provide access to a large system of servers. It also offers you a simple model for building applications that scale automatically to accommodate millions of users. With Programming Google App Engine, you'll get expert practical guidance that will help...

HTML5 Geolocation
HTML5 Geolocation

This book explores the W3C Geolocation API, a specification that provides scripted access to geographical location information associated with a hosted device.* This API defines objects that can be used in JavaScript to ascertain the position of the device on which the code is executed.

Truly revolutionary: now...

OUYA Game Development by Example
OUYA Game Development by Example

An allinclusive, fun guide to making professional 3D games for the OUYA console

About This Book

  • Create enthralling and unique games for the OUYA console
  • Learn basic scripting methods in a three-dimensional game engine
  • Polish and package your games for publishing on the OUYA...
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
Professional iPhone and iPod touch Programming: Building Applications for Mobile Safari
Professional iPhone and iPod touch Programming: Building Applications for Mobile Safari
This hands-on, in-depth book introduces developers to the initial release of the iPhone application platform and assists them in creating Web 2.0 applications that operate on the iPhone and integrate with its services. Author Richard Wagner shares his experience as he guides readers through the process of building new applications from scratch and...
Learning Microsoft Windows Server 2012 Dynamic Access Control
Learning Microsoft Windows Server 2012 Dynamic Access Control

When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.

Overview

  • Understand the advantages of using Dynamic Access Control and how it...
SQL Server 2005 Reporting Essentials
SQL Server 2005 Reporting Essentials

SQL Server 2005 Reporting Services lets you create, manage, and deliver a variety of report types that contain data from relational and multidimensional data sources as well as any data source that has a .NET Framework managed data provider, an OLE DB data provider, or an ODBC provider.

You can create...

Professional Microsoft SharePoint 2007 Workflow Programming
Professional Microsoft SharePoint 2007 Workflow Programming
Microsoft Windows SharePoint Services (WSS) 3.0 and Microsoft Office SharePoint Server (MOSS) 2007 provide you with a rich framework for collaborative applications. Packed with practical, real-world examples, this book offers you clear instructions for implementing workflow, custom activities, and conditions into SharePoint applications....
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Force.com Developer Certification Handbook (DEV401)
Force.com Developer Certification Handbook (DEV401)

When migrating to the new wave of cloud-based applications, we now think about business logic, we think about automating processes, and we think about how we can make the systems better. Force.com is a cloud-based platform that is used to build and deploy enterprise applications on the cloud with minimum coding. Demand for Force.com experts...

Result Page: 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy