 |
|
 EDGE for Mobile InternetThis ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become... |  |  Intelligent Document Retrieval: Exploiting Markup StructureCollections of digital documents can nowadays be found everywhere in institutions, universities or companies. Examples are Web sites or intranets. But searching them for information can still be painful. Searches often return either large numbers of matches or no suitable matches at all. Such document collections can vary a lot in size and how much... |  |  Hacking Photoshop CS2You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command... |
|
 Multimedia Messaging Service: An Engineering Approach to MMSThe Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for... |  |  Internet TelevisionInternet television is the quintessential digital convergence medium, putting together television, telecommunications, the Internet, computer applications, games, and more. It is part of a historic move from individualized narrowband capacity, measured by kilobits per user, to one of broadband with a capacity of megabits per user. This move will... |  |  Building PDA Databases for Wireless and Mobile DevelopmentLearn how to build databases on personal digital devices to be used with PDA applications
Several years ago, the business community accepted the Internet as a viable solution to extending the corporate environment. Today, there is another movement towards enhancing this methodology–– empowering mobile wireless business users with... |
|
 A Business Guide to Information SecurityThis book was designed, and is intended to be used, as both a digital and an analogue (that is, dual online and hardcopy) resource. The speed of evolution in computing and of the internet means that any book on information security starts going out of date fairly quickly. On top of that, there is a six- to eight-month gap between completing the... |  |  Working Smart in Adobe Photoshop CS2Everyone uses Photoshop; however, not everyone uses it efficiently! With this guide, the folks at Adobe Press are hoping to remedy that situation. Realizing that if you're a veteran Photoshop user, you may still be using methods more suitable to long-ago versions and that if you're new to Photoshop, you may be... |  |  Fiber Optics Technician's ManualFiber Optic Technician's Manual, now in its second edition, continues to serve as a practical guide for the designer, installer, and troubleshooter of fiber optic cable plants and networks used in today's communications systems. Comprehensive in scope, this book addresses applications of fiber optics including telephone, CATV, and computer... |
|
 Peer to Peer Computing: The Evolution of a Disruptive TechnologyPeer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to... |  |  EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study GuideWhether monitoring the Internet for threats and chatter, capturing computer evidence, or crunching forensic data, Guidance Software's EnCase computer forensics software is recognized as the premier computer forensics tool on the market. For investigation professionals, EnCE certification tells the world that you've not only mastered the use of... |  |  Grouping Multidimensional Data: Recent Advances in ClusteringClustering is a fundamental problem that has numerous applications in many disciplines. Clustering techniques are used to discover natural groups in datasets and to identify abstract structures that might reside there, without having any background knowledge of the characteristics of the data. They have been used in various areas including... |
|
| Result Page: 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 |