Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Active Networks and Active Network Management: A Proactive Management Framework
Active Networks and Active Network Management: A Proactive Management Framework
Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very...
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Our primary motivation in writing this book is to share our working experience to bridge the gap between the knowledge of industry gurus and newcomers to the spoken language processing community. Many powerful techniques hide in conference proceedings and academic papers for years before becoming widely recognized by the research community or the...
Encyclopedia of Prisoners of War and Internment
Encyclopedia of Prisoners of War and Internment
This invaluable A-to-Z reference work presents nearly 300 entries that survey the history of prisoners of war and interned civilians from the earliest times to the present, with emphasis on the nineteenth and twentieth centuries. It explores such themes as famous prisoners of war throughout history, medical conditions, atrocities, escapes,...
IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

Alfresco Enterprise Content Management Implementation
Alfresco Enterprise Content Management Implementation
This well-crafted and easy-to-use book is a complete guide to implementing enterprise content management in your business using Alfresco. It guides you through creating smart, collaborative content repositories, and shows how to use Alfresco to create more elegant document sharing, better collaborative working, and reliable automated workflow...
UML Demystified
UML Demystified
There’s no easier, faster, or more practical way to learn the really tough subjects

UML Demystified explains how to read, model, and use UML to create well-structured, stable software products. This self-teaching guide comes complete with key points, background information, quizzes at the end of each chapter,...

Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
Sit down at the keyboard and cinch that deal! Press the send button and get the account!

Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...

The Mythical Man-Month: Essays on Software Engineering, 20th  Anniversary Edition
The Mythical Man-Month: Essays on Software Engineering, 20th Anniversary Edition
The classic book on the human elements of software engineering. Software tools and development environments may have changed in the 21 years since the first edition of this book, but the peculiarly nonlinear economies of scale in collaborative work and the nature of individuals and groups has not changed an epsilon. If you write code or...
Microsoft  Windows  SharePoint  Services Inside Out
Microsoft Windows SharePoint Services Inside Out
Take your Windows SharePoint Services experience to the next level! Designed for advanced users, this supremely organized reference packs all the information you need to master every major tool, task, and enhancement in Windows SharePoint Serviceswithout the fluff. Discover how to simplify information sharing, make team collaboration more...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
unlimited object storage image
Result Page: 96 95 94 93 92 91 90 89 88 87 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy