Home | Amazing | Today | Tags | Publishers | Years | Search 
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))
Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))

When carefully selected and used, Domain-Specific Languages (DSLs) may simplify complex code, promote effective communication with customers, improve productivity, and unclog development bottlenecks. In Domain-Specific Languages, noted software development expert Martin Fowler first provides the information software...

Convergence of Mobile and Stationary Next-Generation Networks
Convergence of Mobile and Stationary Next-Generation Networks

The optical networking technology that suffered in the post - dot - com crash several years ago has since recovered and is once again poised for rapid growth due to the exhaustion of available bandwidth. Today, photonics networks transport Internet data over large distances in long - haul and metropolitan networks. Improvements in...

Femtocells: Design & Application
Femtocells: Design & Application

As a cellular standard evolves, there are many variables that must be optimized. A few of these variables are directly related to higher throughput, increased user capacity, and in general improved system performance. The optimization techniques have involved higherorder modulation, improved multiple access (in both time and frequency), more...

Next Generation Transport Networks: Data, Management, and Control Planes
Next Generation Transport Networks: Data, Management, and Control Planes

Covering past, present and future transport networks using three layered planes written by experts in the field.

Targeted at both practitioners and academics as a single source to get an understanding of how transport networks are built and operated

Explains technologies enabling the next generation transport...

Camel in Action
Camel in Action

Apache Camel is a Java framework that lets you implement the standard enterprise integration patterns in a few lines of code. With a concise but sophisticated DSL you snap integration logic into your app, Lego-style, using Java, XML, or Scala. Camel supports over 80 common transports such as HTTP, REST, JMS, and Web Services.

...
Access Technologies: Dsl and Cable (Executive Briefings in Key Technologies)
Access Technologies: Dsl and Cable (Executive Briefings in Key Technologies)

At the end of 2005, the Reporting Services development team had some tough decisions to make. Unlike most of the SQL Server development team, who had been working on the 2005 release for close to five years, it had only been a year and a half since we shipped the first version of Reporting Services. In that same timeframe, we shipped two service...

Cisco Network Professional's Advanced Internetworking Guide
Cisco Network Professional's Advanced Internetworking Guide
Ideal for any IT professional who uses Cisco technologies on a daily basis, or anyone who is preparing for their Cisco Certified Network Professional (CCNP) certification.

The topics covered will be more in depth than other introductory-level books of similar topics, and will span from layer 2 technologies such as switching, STP,...

JBoss Drools Business Rules
JBoss Drools Business Rules

In business, a lot of actions are trigged by rules: "Order more ice cream when the stock is below 100 units and temperature is above 25° C", "Approve credit card application when the credit background check is OK, past relationship with the customer is profitable, and identity is confirmed", and so on. Traditional...

PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Broadband Internet: Access, Regulation and Policy
Broadband Internet: Access, Regulation and Policy
The internet has become so widespread that such issues as access, regulation and related policies have become major factors in the economy and social fabric of societies in every part of the world. Peoples without running water are demanding access to the internet and those without it are becoming deprived citizens. This new book examines current...
IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

Result Page: 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy