Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

EMI Protection for Communication Systems
EMI Protection for Communication Systems

In recent years, the protection of communication services operating in the same of adjacent channels has become more and more challenging. Communication systems need to be protected from natural and man-made interference. This practical reference provides a through understanding of how to protect communication systems from intentional and...

Beginning SQL Server Modeling: Model-Driven Application Development in SQL Server 2008
Beginning SQL Server Modeling: Model-Driven Application Development in SQL Server 2008

Get ready for model-driven application development with SQL Server Modeling! This book covers Microsoft's SQL Server Modeling (formerly known under the code name "Oslo") in detail and contains the information you need to be successful with designing and implementing workflow modeling.

Beginning SQL Server...

Hardboiled Web Design
Hardboiled Web Design

Every web designer harbours tales of frustration, limitation and despair. Web design requires skills and knowledge beyond mere manipulation of form, shape, language, colour, message and meaning. What users don’t see behind those visuals is just as important as what they do see. We have to think about moving parts and engineering...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers
Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers

Business Model Generation is a handbook for visionaries, game changers, and challengers striving to defy outmoded business models and design tomorrow's enterprises. If your organization needs to adapt to harsh new realities, but you don't yet have a strategy that will get you out in front of your competitors, you need...

SAP ABAP Advanced cookbook
SAP ABAP Advanced cookbook

Advanced Business Application Programming (ABAP) is SAP’s proprietary 4th Generation Language (4GL). SAP core is written almost entirely in ABAP. ABAP is a high level programming language used in SAP for development and other customization processes. This book covers advanced SAP programming applications with ABAP. It teaches you to...

AI Game Engine Programming (Game Development Series)
AI Game Engine Programming (Game Development Series)

AI Game Engine Programming provides game developers with the tools and wisdom necessary to create modern game AI engines. It takes programmers from theory to actual game development, with usable code frameworks designed to go beyond merely detailing how a technique might be used. In addition, it surveys the capabilities of the different...

Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)
Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)

Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large...

Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)
Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)

Tensor Product Model Transformation in Polytopic Model-Based Control offers a new perspective of control system design. Instead of relying solely on the formulation of more effective LMIs, which is the widely adopted approach in existing LMI-related studies, this cutting-edge book calls for a systematic modification and...

Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

unlimited object storage image
Result Page: 783 782 781 780 779 778 777 776 775 774 773 772 771 770 769 768 767 766 765 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy