 |
|
|
 Wireless Communications Research TrendsThe scope of this new and important book includes: personal portable telephones, multimedia devices, digital assistants, and communicating palmtop computers; registration and handoff protocols, messaging, and communications and computing requirements; network control and management for protocols associated with routing and tracking of mobile users;... |  |  Computer Viruses and Other Malicious Software: A Threat to the Internet EconomyMalware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents... |  |  Constructive Modeling Of Structural Turbulence And Hydrodynamic InstabilitiesThe book provides an original approach in the research of structural analysis of free developed shear compressible turbulence at high Reynolds number on the base of direct numerical simulation (DNS) and instability evolution for ideal medium (integral conservation laws) with approximate mechanism of dissipation (FLUX dissipative monotone... |
|
 Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... |  |  Modern Mathematics in the Light of the Fields MedalExamines the evolution of certain areas of modern mathematics by recounting the past winners of the international Fields Medal, the - Nobel Prize - of mathematics. Paper. DLC: Mathematics - History 20th century.
This little book is extraordinary in at least three ways. First, it contains in only 150 pages a synopsis of the whole... |  |  Where Men Hide"If you ask men if they spend any time hiding, they usually look at you as if you're nuts. 'What, me hide?' But if you ask women whether men hide, they immediately know what you mean." -- from Where Men Hide
Where Men Hide is a spirited tour of the dark and often dirty places men go to find comfort, camaraderie,... |
|
 Flash with DrupalDue to its power and expandability, Drupal has become one of the most popular open source content management systems. At the same time, Flash has been adopted for its ability to create beautiful and dynamic web applications. By combining these technologies, you can create Flash applications that are both visually stunning and rich in content.... |  |  Vintage Games: An Insider Look at the History of Grand Theft Auto, Super Mario, and the Most Influential Games of All TimeVintage Games explores the most influential videogames of all time, including Super Mario Bros., Grand Theft Auto III, Doom, The Sims and many more. Drawing on interviews as well as the authors' own lifelong experience with videogames, the book discusses each game's development, predecessors, critical reception, and influence on the industry. It... |  |  A Guide to the Wireless Engineering Body of Knowledge (WEBOK)The ultimate reference book for professionals in the wireless industry
The information presented in this book reflects the evolution of wireless technologies, their impact on the profession, and the industry's commonly accepted best practices. Organized into seven main areas of expertise, A Guide to the Wireless... |
|
| Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |