Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Development: Building Reliable Systems
Software Development: Building Reliable Systems

80% of software projects fail -- here’s why the other 20% succeed!

Software Development is the most thorough, realistic guide to "what works" in software development - and how to make it happen in your organization. Leading consultant Marc Hamilton tackles all three key components of...

C# Essentials (2nd Edition)
C# Essentials (2nd Edition)
Concise but thorough, this second edition of C# Essentials introduces the Microsoft C# programming language, including the Microsoft .NET Common Language Runtime (CLR) and .NET Framework Class Libraries (FCL) that support it. This book's compact format and terse presentation of key concepts serve as a roadmap to the...
Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Hacking del.icio.us
Hacking del.icio.us
I wrote this book with tinkerers in mind—that is to say, tinkerers of various levels of familiarity with del.icio.us in particular and Web development skill in general.Whether you’re just getting on your way to being a power user at del.icio.us, or whether you’re a hardcore Web development guru who’s running your own...
Jess in Action: Java Rule-Based Systems
Jess in Action: Java Rule-Based Systems
A practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and...
The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services, Second Editionbuilds on the success of the previous best-selling edition, providing comprehensive coverage of IMS – its concepts, architecture, protocols and functionalities with a wealth of new and updated material. Mobile telephony with the current technology has been hugely...
Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Spread Spectrum and CDMA: Principles and Applications
Spread Spectrum and CDMA: Principles and Applications
Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.

This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT,...

Computational Approaches to Biochemical Reactivity (Understanding Chemical Reactivity)
Computational Approaches to Biochemical Reactivity (Understanding Chemical Reactivity)
This book summarises recent results in the rapidly developing discipline of the computational aspects of biochemical reactivity. It presents a comprehensive and critical treatise on the subject, with numerous references covering practically all relevant and recent work. The chapters, written by eminent experts in the field, deal with quantum...
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

3G Evolution
3G Evolution
This very up-to-date and practical book, written by engineers working closely in 3GPP, gives insight into the newest technologies and standards adopted by 3GPP, with detailed explanations of the specific solutions chosen and their implementation in HSPA and LTE.

The key technologies presented include multi-carrier transmission,
...
Beginning Game Development with Python and Pygame: From Novice to Professional
Beginning Game Development with Python and Pygame: From Novice to Professional
Like music and movies, video games are rapidly becoming an integral part of our lives. Over the years, you've yearned for every new gaming console, mastered each blockbuster within weeks after its release, and have even won a local gaming competition or two. But lately you've been spending a lot of time thinking about a game idea of your own, or...
unlimited object storage image
Result Page: 881 880 879 878 877 876 875 874 873 872 871 870 869 868 867 866 865 864 863 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy