Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Mesh Networks – Efficient Link Scheduling, Channel Assignment and Network Planning Strategies
Wireless Mesh Networks – Efficient Link Scheduling, Channel Assignment and Network Planning Strategies
Wireless mesh networks (WMNs) have recently received a great deal of attention as a promising cost-effective solution to provide coverage and broadband wireless connectivity for mobile users to get access to different IP applications and services. The factor that has helped WMNs become attractive is the wide application prospects...
Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence
Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence
An eye-opening report from an award-winning author and former New York Times reporter reveals the link between teenage marijuana use and mental illness, and a hidden epidemic of violence caused by the drug—facts the media have ignored as the United States rushes to legalize cannabis.

Recreational
...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Silverlight 4 User Interface Cookbook
Silverlight 4 User Interface Cookbook

Silverlight makes it much easier to build web applications with highly usable, interactive, and exciting user interfaces. However, with so many new options open to designers and developers, making the best use of the tools available is not always so easy. It's ease of use and rapid development process has left one area completely...

Beginning ASP.NET 4.5: in C# and VB
Beginning ASP.NET 4.5: in C# and VB
TO BUILD EFFECTIVE AND ATTRACTIVE database-driven websites, you need two things: a solid and fast framework to run your web pages on and a rich and extensive environment to create and pro- gram these web pages. With ASP.NET 4.5 and Visual Studio 2012 you get both. Together they form the platform to create dynamic and interactive websites. ...
C++17 By Example: Practical projects to get you up and running with C++17
C++17 By Example: Practical projects to get you up and running with C++17

Discover the impressive capabilities of C++ and learn the skills you need to implement it in real life

Key Features

  • Leverage the power of C++ language constructs to build effective software
  • Learn about file handling and pointers
  • Build visually appealing...
Microsoft Office Excel 2003 Inside Out
Microsoft Office Excel 2003 Inside Out
Hey, you know your way around a spreadsheet—so now dig into Excel 2003 and really put your data to work! This supremely organized reference packs hundreds of time-saving solutions, troubleshooting tips, and handy workarounds in concise, fast answer format. Work smarter with core functions such as using worksheets and charts, analyzing data,...
Wireless Sensor Networks (Ian F. Akyildiz Series in Communications and Networking)
Wireless Sensor Networks (Ian F. Akyildiz Series in Communications and Networking)

This book presents an in-depth study on the recent advances in Wireless Sensor Networks (WSNs). The authors describe the existing WSN applications and discuss the research efforts being undertaken in this field. Theoretical analysis and factors influencing protocol design are also highlighted. The authors explore state-of-the-art protocols...

Networking Wireless Sensors
Networking Wireless Sensors
With its origins in the early nineties, the subject of wireless sensor networks
has seen an explosive growth in interest in both academia and industry. In just
the past five years several hundred papers have been written on the subject. I
have written this book because I believe there is an urgent need to make this vast...
Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Visual Media Coding and Transmission
Visual Media Coding and Transmission

This book presents the state-of-the-art in visual media coding and transmission

Visual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy