Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Logic, Epistemology, and the Unity of Science
Logic, Epistemology, and the Unity of Science

The aim of the series Logic, Epistemology, and the Unity of Science, of which this is the first volume, is to take up anew the challenge of considering the scientific enterprise in its entirety in light of recent developments in logic and philosophy. Developments in logic are especially relevant to the current situation in philosophy of...

The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)
The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)

The study of social networks was originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant...

The Syntax and Semantics of Noun Modifiers and the Theory of Universal Grammar: A Korean Perspective (Studies in Natural Language and Linguistic Theory (96))
The Syntax and Semantics of Noun Modifiers and the Theory of Universal Grammar: A Korean Perspective (Studies in Natural Language and Linguistic Theory (96))
This book takes Korean as a basis to provide a detailed universal Determiner Phrase (DP) structure. Adnominal adjectival expressions are apparently optional noun dependents but their syntax and semantics have been shown to provide an important window on the internal structure of DP. By carefully examining data from Korean, an understudied...
Big Breaches: Cybersecurity Lessons for Everyone
Big Breaches: Cybersecurity Lessons for Everyone
Neil and Moudy have written a book that will help us reduce our exposure as a society to future “big breaches” but also to many of the technology risks we face in an increasingly digitized society. They do this not by presenting a “recipe” for success but by making the subject accessible to audiences who...
Database Annotation in Molecular Biology: Principles and Practice
Database Annotation in Molecular Biology: Principles and Practice
Two factors dominate current molecular biology: the amount of raw data is increasing very rapidly and successful applications in biomedical research require carefully curated and annotated databases.  The quality of the data - especially nucleic acid sequences - is satisfactory; however, annotations depend on features inferred from the data...
Reflections on the Teaching of Programming: Methods and Implementations (Lecture Notes in Computer Science)
Reflections on the Teaching of Programming: Methods and Implementations (Lecture Notes in Computer Science)
This state-of-the-art survey, reflecting on the teaching of programming, has been written by a group of primarily Scandinavian researchers and educators with special interest and experience in the subject of programming. The 14 chapters - contributed by 24 authors - present practical experience gathered in the process of teaching programming and...
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Bond Investing For Dummies
Bond Investing For Dummies

Bonds and bond funds are among the safest and most reliable investments you can make to ensure an ample and dependable retirement income — if you do it right! Bond Investing For Dummies helps you do just that, with clear explanations of everything you need to know to build a diversified bond portfolio that will be there when you...

Temporary Appropriation in Cities: Human Spatialisation in Public Spaces and Community Resilience
Temporary Appropriation in Cities: Human Spatialisation in Public Spaces and Community Resilience

This book conceptualises and illustrates temporary appropriation as an urban phenomenon, exploring its contributions to citizenship, urban social sustainability and urban health. It explains how some forms of appropriation can be subversive, existing in a grey area between legal and illegal activities in the city.

The...

Technologies for the Wireless Future: Wireless World Research Forum (WWRF)
Technologies for the Wireless Future: Wireless World Research Forum (WWRF)
As 3G mobile communication systems are being deployed, the research community is now focusing on the research needed for the long-term evolution of 3G and 4G systems. This fully updated second volume of the successful Technologies for the Wireless Future is a unique and timely book, presenting up-to-the-minute ideas and trends in mobile...
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

unlimited object storage image
Result Page: 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 177 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy