Home | Amazing | Today | Tags | Publishers | Years | Search 
Object-Oriented Software Construction (2nd Edition)
Object-Oriented Software Construction (2nd Edition)
The definitive reference on the most important new technology in software!

“While the original version of OOSC is a classic, OOSC 2/E is destined to overshadow it and all other general introductions . . . literally an epic work.” —James C. McKim, Jr., Hartford Graduate Center

“Compelling. Extremely...

Adaptive Blind Signal and Image Processing
Adaptive Blind Signal and Image Processing
With solid theoretical foundations and numerous potential applications, Blind Signal Processing (BSP) is one of the hottest emerging areas in Signal Processing. This volume unifies and extends the theories of adaptive blind signal and image processing and provides practical and efficient algorithms for blind source separation, Independent,...
The Wireless Data Handbook
The Wireless Data Handbook
This fourth edition of the Wireless Data Handbook will begin to reach readers in 1999,
the centennial year of Marconi’s first sale of data radio to the British Navy. For the
army of fresh, young people now turning their impressive energy and intellect to this
growing field, it is fitting to have enough historical perspective to
...
SAP R/3 Administrator's Handbook
SAP R/3 Administrator's Handbook

Demystify today's premier client/server enterprise software!

The all-in-one guide to successfully implementing enterprise-wide business process engineering now brings you up to speed on the #1 software's latest features. SAP R/3 Handbook, Second Edition, by Jose Antonio Hernandez, explains in easy-to-follow steps all stages of R/3...

The UMTS Network and Radio Access Technology: Air Interface Techniques for Future Mobile Systems
The UMTS Network and Radio Access Technology: Air Interface Techniques for Future Mobile Systems
The UMTS Network and Radio Access Technology covers all the key aspects of UMTS and its implementation from both the engineering design and the operator and service providers' point of view. It addresses the essential tasks involved in UMTS network deployment in new regions and within existing 2G networks. Presenting solutions for the...
The CISSP Prep Guide: Gold Edition
The CISSP Prep Guide: Gold Edition
An arsenal of inside information on CISSP and how to master the certification test!

More and more frequently, corporations are requiring that their employees provide professional certifications to prove that they possess the core competencies to do their technical jobs. The Certified Information Systems Security Professional examination (CISSP)...

The Worldwide History of Telecommunications
The Worldwide History of Telecommunications
The first comprehensive history of the Information Age how we got there and where we are going

The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in...

A Guide to MATLAB: For Beginners and Experienced Users
A Guide to MATLAB: For Beginners and Experienced Users

This book is a short, focused introduction to MATLAB, a comprehensive
software system for mathematics and technical computing. It will
be useful to bothbeginning and experienced users. It contains concise
explanations of essential MATLAB commands, as well as easily understood
instructions for using
...

Numerical Recipes in C: The Art of Scientific Computing, Second Edition
Numerical Recipes in C: The Art of Scientific Computing, Second Edition
Our aim in writing the original edition of Numerical Recipes was to provide a
book that combined general discussion, analytical mathematics, algorithmics, and
actual working programs. The success of the first edition puts us now in a difficult,
though hardly unenviable, position. We wanted, then and now, to write a book
that is
...
Planning for Survivable Networks
Planning for Survivable Networks
Keep your network safe from security disasters with a dependable recovery strategy

Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.

In the information-packed pages of this book, Annlee Hines shares her...

Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
Video Coding for Mobile Communications: Efficiency, Complexity and Resilience (Signal Processing and its Applications)
This book concentrates on three main challenges of video coding for mobile communications: higher coding efficiency, reduced computational complexity, and improved error resilience. Unlike other high level books and articles that focus on individual aspects in this field, this book has been designed as a quick, easy, and practical introduction to...
Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Optimizing compilers have a fundamental problem. No matter how powerful their optimizations
are, they are no substitute for good application algorithms. Consider the case of
sorting. For sufficiently large data sets, a merge sort algorithm compiled with a less powerful
optimizer will always out-perform a selection sort algorithm
...
Result Page: 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy