Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Floating Gate Devices: Operation and Compact Modeling
Floating Gate Devices: Operation and Compact Modeling
The goal of this book is twofold. First, it explains the principles and physical mechanisms of Floating Gate device operations. Second, starting from a general overview on Compact Modeling issues, it illustrates features and details of a complete Compact Model of a Floating Gate device, the building block of Flash Memories, one of the...
Object-Oriented Software Construction (2nd Edition)
Object-Oriented Software Construction (2nd Edition)
The definitive reference on the most important new technology in software!

“While the original version of OOSC is a classic, OOSC 2/E is destined to overshadow it and all other general introductions . . . literally an epic work.” —James C. McKim, Jr., Hartford Graduate Center

“Compelling. Extremely...

Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet for Metro Area Networks
Gigabit Ethernet has been deployed in the metro space, providing low cost, easily managed bandwidth for intensive applications like video, storage, and ASPs. 10 Gigabit Ethernet (IEEE 802.3a) will make the use of Ethernet in the Metro area even more attractive. IDC projects that GigE revenues in the U.S., marked at $155 million in 2001, will grow...
Security In Wireless LANS And MANS (Artech House Computer Security)
Security In Wireless LANS And MANS (Artech House Computer Security)
Wireless communications are becoming ubiquitous in homes, offices, and enterprises
with the popular IEEE 802.11 wireless LAN technology and the up-andcoming
IEEE 802.16 wireless MAN technology. The wireless nature of communications
defined in these standards makes it possible for an attacker to snoop on
confidential
...
Scalable Infrastructure for Distributed Sensor Networks
Scalable Infrastructure for Distributed Sensor Networks
Wireless sensor networks is a rapidly developing area. New applications are emerging and breakthroughs are being made in solving the underlying scientific problems.

The effectiveness of sensor networks depends largely on deployment strategies, self-organization capabilities, routing and information dissemination protocols, all of which...

Network Technology for Digital Audio (Music Technology)
Network Technology for Digital Audio (Music Technology)
Looking at new developments and trends, it explains the shortcomings and strong points and looks at the work being done to deliver the requirements of the digital audio environment. Proprietary and open systems developed within the audio industry are examined, with each case being supported with appropriate history and clear technical explanation....
Entrepreneurship Three Volumes: The Engine of Growth (Praeger Perspectives) (v. 1-3)
Entrepreneurship Three Volumes: The Engine of Growth (Praeger Perspectives) (v. 1-3)
“This three-volume set brings together 32 essays exploring the topic of entrepreneurship. The first volume explores entrepreneurship as a form of human action, examining the influence of various factors on entrepreneurial behavior, including cognition, risk, social capital, institutions, immigration and ethnicity, and gender. The second...
The Ruby Way, Second Edition: Solutions and Techniques in Ruby Programming (2nd Edition)
The Ruby Way, Second Edition: Solutions and Techniques in Ruby Programming (2nd Edition)
Ruby is an agile object-oriented language, borrowing some of the best features from LISP, Smalltalk, Perl, CLU, and other languages. Its popularity has grown tremendously in the five years since the first edition of this book.

 

The Ruby Way takes a “how-to” approach to Ruby...

Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n
Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n
The first version of the 802.11 standard was ratified in 1997 after seven long years of development. However, initial adoption of this new technology was slow, partly because of the low penetration of devices that needed the “freedom of wireless.”

The real opportunity for 802.11 came with the increased popularity of laptop
...
Wi-Fi Security
Wi-Fi Security
COMPLETE COVERAGE OF THE TECHNOLOGY THAT’S MAKING WIRELESS COMMUNICATIONS VIRTUALLY IMMUNE TO HACKERS!

Wireless technology offers businesses a world of strategic advantages — and a host of security problems. But thanks to McGraw-Hill’s WiFi Security, your company’s mission-critical data can be...

Voice over 802.11 (Artech House Telecommunications Library)
Voice over 802.11 (Artech House Telecommunications Library)
An understanding of the public switched telephone network (PSTN) and how it is
potentially going to be replaced is best grasped by understanding its three major
components: access, switching, and transport. Access pertains to how a user
accesses the network. Switching refers to how a call is “switched” or routed...
Rationale-Based Software Engineering
Rationale-Based Software Engineering
Many decisions are required throughout the software development process. These decisions, and to some extent the decision-making process itself, can best be documented as the rationale for the system, which will reveal not only what was done during development but the reasons behind the choices made and alternatives considered and rejected. This...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy