Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
C++ 2013 for C# Developers
C++ 2013 for C# Developers

C++/CLI was originally envisioned as a high-level assembler for the .NET runtime, much like C is often considered a high-level assembler for native code generation. That original vision even included the ability to directly mix IL with C++ code, mostly eliminating the need for the IL assembler ilasm.

As the design of C++/CLI
...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Heaven Is Empty: A Cross-Cultural Approach to
Heaven Is Empty: A Cross-Cultural Approach to
In the past few decades, discussions on the role of religion in shaping the interconnections of politics, society, and culture have acquired a particular urgency. Since the end of the Cold War, after 9/11, and even more so with the surge of IS, religion has come to occupy a central position in discourses on the...
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

Algorithms in Combinatorial Design Theory (Mathematics Studies)
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Recent years have seen an explosive growth in research in combinatorics and graph theory. One primary factor in this rapid development has been the advent of computers, and the parallel study of practical and efficient algorithms. This volume represents an attempt to...
Procedural Content Generation for C++ Game Development
Procedural Content Generation for C++ Game Development

Get to know techniques and approaches to procedurally generate game content in C++ using Simple and Fast Multimedia Library

About This Book

  • This book contains a bespoke Simple and Fast Multimedia Library (SFML) game engine with complete online documentation
  • Through this book, you'll...
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
Jeff Duntemann's Drive-By Wi-Fi Guide
Jeff Duntemann's Drive-By Wi-Fi Guide
Everything you need to know to design, build, protect, and extend a Wi-Fi wireless network!

You don’t have to knock holes in your walls to network your computers and share your family’s Internet connection. Wi-Fi connects computers, printers, video cameras and game consoles into a fast Ethernet network via microwaves. In this...

Emotional Intelligence in Action: Training and Coaching Activities for Leaders, Managers, and Teams
Emotional Intelligence in Action: Training and Coaching Activities for Leaders, Managers, and Teams

The importance of emotional intelligence as a critical factor in personal and business success is now well established. Emotional Intelligence in Action, Second Edition shows how to tap the power of EI to build effective emotional skills and create real change for leaders and teams.

This book breaks new ground in providing a...

File Management Made Simple, Windows Edition
File Management Made Simple, Windows Edition

Managing data is an essential skill that every PC user should have. Surprisingly though, a large number of users--even highly experienced users--exhibit poor file management skills, resulting in frustration and lost data. This brief but invaluable book, File Management Made Simple can resolve this by providing you...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy