Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Packet Guide to Voice over IP: A system administrator's guide to VoIP technologies
Packet Guide to Voice over IP: A system administrator's guide to VoIP technologies

Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology. With this concise guide, you’ll learn about services involved in VoIP and get a first-hand view of network data packets from the time the phones boot through calls and...

Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Scaling Oracle8i(TM): Building Highly Scalable OLTP System Architectures
Scaling Oracle8i(TM): Building Highly Scalable OLTP System Architectures
This is a book about getting the most out of Oracle8i on UNIX systems. While many people understand how to administrate Oracle and UNIX, far fewer understand the issues and workings of the software and hardware, thus limiting the scalability of the system. This book aims to open up this essential information, enabling the reader to build faster,...
C# 2008 Programmer's Reference (Wrox Programmer to Programmer)
C# 2008 Programmer's Reference (Wrox Programmer to Programmer)
Have access to all aspects of the C# programming language at hand with the C# 2008 Programmer’s Reference, the only comprehensive reference guide for C# programmers. Regardless of your experience with C#, you will appreciate the detailed code samples, which offer a quick and easy way to help you refresh your understanding of...
Robot Manipulator Control: Theory and Practice (Control Engineering, 15)
Robot Manipulator Control: Theory and Practice (Control Engineering, 15)

Discloses the elements of control theory and robot dynamics. Surveys computed-torque control, robust control of robotic manipulators, adaptive control of robotic manipulators, neural network control of robots, force control, and advanced control techniques. Includes information on designing and operating robotic platforms in discussing robot...

Feedback Strategies for Wireless Communication
Feedback Strategies for Wireless Communication

This book explores the different strategies regarding limited feedback information. The book analyzes the impact of quantization and the delay of CSI on the performance. The author shows the effect of the reduced feedback information and gives an overview about the feedback strategies in the standards. This volume presents theoretical...

Beginning Oracle Application Express 4
Beginning Oracle Application Express 4

Welcome to the wonderful world of Oracle Application Express (APEX). You’re about to learn how to use a tool that we believe will revolutionize the way you think about and approach writing web-based Oracle systems. It certainly has for us.

Prior to the advent of APEX, developing fully interactive web based systems over data...

Intro to Java Programming, Comprehensive Version (10th Edition)
OFDM-Based Broadband Wireless Networks: Design and Optimization
OFDM-Based Broadband Wireless Networks: Design and Optimization
Emerging technologies such as WiFi and WiMAX are profoundly changing the
landscape of wireless broadband. As we evolve into future generation wireless
networks, a primary challenge is the support of high data rate, integrated multimedia
type traffic over a unified platform. Due to its inherent advantages in
high-speed
...
Sony Clie for Dummies
Sony Clie for Dummies
Put your office and more in the palm of your hand!

Manage contacts, tasks, and appointments, send e-mail, and play games

Your Sony CLIÉ is an amazing gadget, and with this book to guide you, it’ll soon become your best friend. Sure, it keeps your schedule, to-do list, and address book, but did you know it’ll also...

Integration of Alternative Sources of Energy
Integration of Alternative Sources of Energy
Our goal in writing this book was to discuss the ‘‘electrical side’’ of alternative energy sources. From the beginning, we felt that this approach would be a challenge that would be very difficult to fulfill. Most of the current technical work explores just one or two types of alternative energy sources, but the integration...
North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)
North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)

This book examines North Korea’s nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea’s military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang’s...

unlimited object storage image
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy