Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WiMAX Handbook (McGraw-Hill Communications)
WiMAX Handbook (McGraw-Hill Communications)
Get a thorough introduction to WiMAX--the revolutionary new 802.16 IEEE standard for point-to-point and point-to-multipoint wireless broadband access. Written by networking expert Frank Ohrtman, this detailed guide annotates the 802.16 specification and explains how to design and build a robust, reliable, and secure WiMAX network that takes full...
Embedded Systems Handbook, Second Edition: Networked Embedded Systems (Industrial Information Technology)
Embedded Systems Handbook, Second Edition: Networked Embedded Systems (Industrial Information Technology)
Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to...
Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Serverless Architectures with AWS: Discover how you can migrate from traditional deployments to serverless architectures with AWS
Serverless Architectures with AWS: Discover how you can migrate from traditional deployments to serverless architectures with AWS

Don't waste your energy thinking about servers; use AWS to build enterprise-grade serverless applications.

Key Features

  • Learn how to quickly and easily go serverless
  • Explore AWS and Lambda: the first building blocks of serverless applications on AWS
  • ...
The Sexual Economy of War: Discipline and Desire in the U.S. Army (Battlegrounds: Cornell Studies in Military History)
The Sexual Economy of War: Discipline and Desire in the U.S. Army (Battlegrounds: Cornell Studies in Military History)

In The Sexual Economy of War, Andrew Byers argues that in the early twentieth century, concerns about unregulated sexuality affected every aspect of how the US Army conducted military operations. Far from being an exercise marginal to the institution and its scope of operations, governing sexuality was, in fact, integral to...

Middleware Networks: Concept, Design and Deployment of Internet Infrastructure
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing IP Service Platforms and emerging managed IP networks with a reference architecture from the AT&T Labs GeoPlex project. The main goal is to present basic principles that both the telecommunications industry and the Internet...
QlikView 11 for Developers: Effective analytics techniques for modern Business Intelligence
QlikView 11 for Developers: Effective analytics techniques for modern Business Intelligence

Gain an in-depth understanding of how to build applications for Business Intelligence using QlikView

Key Features

  • Learn to build applications for Business Intelligence while following a practical case - HighCloud Airlines. Each chapter develops parts of the application and it evolves throughout the book...
Hands-On Guide to Flash Video: Web Video and Flash Media Server (Hands-On Guide Series)
Hands-On Guide to Flash Video: Web Video and Flash Media Server (Hands-On Guide Series)

The Hands-On Guide to Flash Video is a professional reference book written by industry experts that are currently helping professionals produce Web video and implement Flash Media Server. This book covers Flash Video production from soup to nuts, beginning with how to configure your camcorder and ending to advanced server techniques like...

Getting Started with Oracle BPM Suite 11gR1 - A Hands-On Tutorial
Getting Started with Oracle BPM Suite 11gR1 - A Hands-On Tutorial

This fully illustrated step-by-step tutorial is based on proven training content that has been highly praised by hundreds of developers in product training courses given as part of the BPM Suite 11g rollout. You will learn how to build a business process application project iteratively with each chapter introducing new technology components...

Mastering FreeBSD and OpenBSD Security
Mastering FreeBSD and OpenBSD Security

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main...

Expert Cube Development with Microsoft SQL Server 2008 Analysis Services
Expert Cube Development with Microsoft SQL Server 2008 Analysis Services
Microsoft SQL Server Analysis Services ("Analysis Services" from here on) is now ten years old, a mature product proven in thousands of enterprise-level deployments around the world. Starting from a point where few people knew it existed and where those that did were often suspicious of it, it has grown to be the most widely deployed OLAP...
Role-Based Access Control
Role-Based Access Control

Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy