Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
802.11ac: A Survival Guide
802.11ac: A Survival Guide

The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.

Author Matthew Gast—an industry...

Thinking on the Web: Berners-Lee
Thinking on the Web: Berners-Lee

Tim Berners-Lee, Kurt Gödel, and Alan Turing are the pivotal pioneers who opened the door to the Information Revolution, beginning with the introduction of the computer in the 1950s and continuing today with the World Wide Web evolving into a resource with intelligent features and capabilities.

Taking...

The Music of the Big Bang: The Cosmic Microwave Background and the New Cosmology (Astronomers' Universe)
The Music of the Big Bang: The Cosmic Microwave Background and the New Cosmology (Astronomers' Universe)
The cosmic microwave background radiation is the afterglow of the big bang: a tenuous signal, more than 13 billion years old, which carries the answers to many of the questions about the nature of our Universe. It was serendipitously discovered in 1964, and thoroughly investigated in the last four decades by a large number of experiments. Two...
Mobile Multimedia Processing: Fundamentals, Methods, and Applications
Mobile Multimedia Processing: Fundamentals, Methods, and Applications

Whereas the mobile device has become ubiquitous in people's daily life not only as a cellular phone but also as a media player, a mobile computing device, and a personal assistant, it is particularly important to address challenges timely in applying advanced pattern recognition, signal, information and multimedia processing techniques,...

Scenarios and Responses to Future Deep Oil Spills: Fighting the Next War
Scenarios and Responses to Future Deep Oil Spills: Fighting the Next War
It has often been said that generals prepare for the next war by re-fighting the last.  The Deepwater Horizon (DWH) oil spill was unlike any previous – an underwater well blowout 1,500 meters deep.  Much has been learned in the wake of DWH and these lessons should in turn be applied to both similar oil spill scenarios...
Learning Bayesian Models with R
Learning Bayesian Models with R

Become an expert in Bayesian Machine Learning methods using R and apply them to solve real-world big data problems

About This Book

  • Understand the principles of Bayesian Inference with less mathematical equations
  • Learn state-of-the art Machine Learning methods
  • Familiarize...
Grid Computing: The New Frontier of High Performance Computing, Volume 14 (Advances in Parallel Computing)
Grid Computing: The New Frontier of High Performance Computing, Volume 14 (Advances in Parallel Computing)
The book deals with the most recent technology of distributed computing.

As Internet continues to grow and provide practical connectivity between users of computers it has become possible to consider use of computing resources which are far apart and connected by Wide Area Networks.
Instead of using only local computing power it has
...
Between the Ottomans and the Entente: The First World War in the Syrian and Lebanese Diaspora, 1908-1925
Between the Ottomans and the Entente: The First World War in the Syrian and Lebanese Diaspora, 1908-1925
Since 2011 over 5.6 million Syrians have fled to Turkey, Lebanon, Jordan, and beyond, and another 6.6 million are internally displaced. The contemporary flight of Syrian refugees comes one century after the region's formative experience with massive upheaval, displacement, and geopolitical intervention: the First World War.
...
Cybercrime, Digital Forensics and Jurisdiction (Studies in Computational Intelligence)
Cybercrime, Digital Forensics and Jurisdiction (Studies in Computational Intelligence)

The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and...

Intellectual Capital for Communities: Nations, Regions, and Cities
Intellectual Capital for Communities: Nations, Regions, and Cities
"a welcome and timely overview of a new and vibrant Intellectual Capital frontier. The chapters are fresh and topical. This is required reading!"
Karl-Erik Sveiby, Professor at Swedish School of Economics and Business Administration, Helsinki, Finland

"Bounfour and Edvinsson's extension of the burgeoning
...
Wild Bill: The True Story of the American Frontier's First Gunfighter
Wild Bill: The True Story of the American Frontier's First Gunfighter

The definitive true story of Wild Bill, the first lawman of the Wild West, by the #1 New York Times bestselling author of Dodge City.

In July 1865, "Wild Bill" Hickok shot and killed Davis Tutt in Springfield, MO?the first quick-draw duel on the frontier.
...

Hacking Cyberspace
Hacking Cyberspace
In Hacking Cyberspace David J. Gunkel examines the metaphors applied to new technologies, and how those metaphors inform, shape, and drive the implementation of the technology in question. The author explores the metaphorical tropes that have been employed to describe and evaluate recent advances in computer technology, telecommunications...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy