Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
Mathematics for Computer Graphics
Mathematics for Computer Graphics
Baffled by maths? Then don't give up hope. John Vince will show you how to understand many of the mathematical ideas used in computer animation, virtual reality, CAD, and other areas of computer graphics. In thirteen chapters you will rediscover - and hopefully discover for the first time a new way of understanding - the mathematical techniques...
The Book of IRC: The Ultimate Guide to Internet Relay Chat
The Book of IRC: The Ultimate Guide to Internet Relay Chat
ICQ and other new-fangled chat applications may get most of the press, but Internet Relay Chat (IRC) remains the Wild West of real-time online conversations. Populated by the most diverse collection of characters this side of the Mos Eisley cantina scene in Star Wars, IRC will keep you up late chatting with people all over the world. The...
Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Spread Spectrum and CDMA: Principles and Applications
Spread Spectrum and CDMA: Principles and Applications
Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.

This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT,...

Beginning Game Development with Python and Pygame: From Novice to Professional
Beginning Game Development with Python and Pygame: From Novice to Professional
Like music and movies, video games are rapidly becoming an integral part of our lives. Over the years, you've yearned for every new gaming console, mastered each blockbuster within weeks after its release, and have even won a local gaming competition or two. But lately you've been spending a lot of time thinking about a game idea of your own, or...
Handbook of Research on Virtual Workplaces and the New Nature of Business Practices
Handbook of Research on Virtual Workplaces and the New Nature of Business Practices
At one time, the office was a physical place, and employees congregated in the same location to work together on projects. The advent of the Internet and the World Wide Web, however, not only made the unthinkable possible, it forever changed the way persons view both the office and work. The Handbook of Research on Virtual Workplaces and the New...
Principles of Model Checking
Principles of Model Checking
Our growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twenty years is model checking, which systematically (and automatically) checks whether a model of a...
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Database Performance Tuning and Optimization
Database Performance Tuning and Optimization
The book provides comprehensive coverage of database performance tuning and optimization using Oracle 8i as the RDBMS. The chapters contain both theoretical discussions dealing with principles and methodology as well as actual SQL scripts to implement the methodology. The book combines theory with practice so as to make it useful for DBAs and...
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
unlimited object storage image
Result Page: 855 854 853 852 851 850 849 848 847 846 845 844 843 842 841 840 839 838 837 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy