Home | Amazing | Today | Tags | Publishers | Years | Search 
Enhancing E-Learning with Media-Rich Content and Interactions
Enhancing E-Learning with Media-Rich Content and Interactions
Online learning is transcending from the text-rich educational experience of the past to a video- and audio-rich learning transformation. The greater levels of media-rich content and media-rich interaction that are currently prevalent in online leisure experiences will help to increase e-learning s future efficiency and effectiveness....
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role-based access control (RBAC) promises to provide several benefits to organizations. These benefits include simplified security provisioning and administration, ease of reporting on privileges and to whom they are available, and finer grained security authorization. By being policy-neutral, RBAC can be used to enforce the variety of access...
OFDM Towards Fixed and Mobile Broadband Wireless Access
OFDM Towards Fixed and Mobile Broadband Wireless Access
Presenting the state of the art in broadband wireless access technology, this unique resource methodically presents the fundamentals of OFDM(A) technology--the cornerstone of the next generation of broadband wireless access offerings. In addition, this book succinctly depicts the future landscape of mobile broadband wireless access and the...
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
A software testing survival guide to deliver winning Internet-based applications

Accessibility, reliability, availability, and security of Web applications on all types of platforms are key to winning business and customers. The technol-ogy continues to change at a fast pace, and savvy end-users are demanding products and services with fewer...

Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Voice, Video, and Data Network Convergence:  Architecture and Design, From VoIP to Wireless
Voice, Video, and Data Network Convergence: Architecture and Design, From VoIP to Wireless
The first book that covers convergence of voice, video and data networks from a vendor-neutral perspective.

*Covers the latest standards and those being developed in an ever-evolving field
*Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in
...
Internet Marketing: Strategy, Implementation and Practice (3rd Edition)
Internet Marketing: Strategy, Implementation and Practice (3rd Edition)
This book is a comprehensive guide to how organizations can use the internet to support their marketing activities and covers all aspects of Internet marketing - environment analysis, strategy development and implementation. Building on the successful and widely regarded first edition, this second edition has a completely revised structure and...
Java 2 Web Developer Certification Study Guide, 2nd Edition
Java 2 Web Developer Certification Study Guide, 2nd Edition

Here’s the book you need to prepare for Exam 310-080, Sun Certified Web Component Developer for J2EE Platform.

This Study Guide provides:

  • In-depth coverage of every exam objective
  • Practical information on programming servlets, developing JSP pages,...
Bio-inspired Algorithms for the Vehicle Routing Problem (Studies in Computational Intelligence)
Bio-inspired Algorithms for the Vehicle Routing Problem (Studies in Computational Intelligence)
The vehicle routing problem (VRP) is one of the most famous combinatorial optimization problems. In simple terms, the goal is to determine a set of routes with overall minimum cost that can satisfy several geographical scattered demands. Biological inspired computation is a field devoted to the development of computational tools modeled after...
Philosophical Frameworks for Understanding Information Systems
Philosophical Frameworks for Understanding Information Systems
Information systems have five main areas of research and practice in which humans relate to information and communications technology. Typically isolated from one another, these areas are: the nature of computers and information, the creation of information technologies, the development of artifacts for human use, the usage of information systems,...
C: An advanced introduction (Principles of computer science series)
C: An advanced introduction (Principles of computer science series)
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
XML Schemas
XML Schemas
To many XML believers and purists, there’s been a canker at the heart of the beautiful rose that is XML since its very inception. Worse still, some believe that canker was put there by design. That canker is, of course, the Document Type Definition, or DTD, that defines the very essence of XML. DTDs are “foreign imports” based on...
Result Page: 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 776 775 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy