 |
|
|
|
 Handbook of Mathematical Formulas and Integrals, Fourth EditionThis book contains a collection of general mathematical results, formulas, and integrals that occur throughout applications of mathematics. Many of the entries are based on the updated fifth edition of Gradshteyn and Ryzhik’s ”Tables of Integrals, Series, and Products,” though during the preparation of the book, results were also... |  |  Microformats: Empowering Your Markup for Web 2.0Microformats burst onto the scene a couple of years ago and are fast becoming an essential tool for all professional web designers and developers. Imagine being able to integrate all of your web-based contact details, tagged articles, and geographical information seamlessly in web and desktop applications, without having to add anything extra to... |  |  Cognitive Radio Technology (Communications Engineering)Cognitive radio technology is a smarter, faster, and more efficient way to transmit information to and from fixed, mobile, other wireless communication devices. Cognitive radio builds upon software-defined radio technology. A cognitive radio system is 'aware' of its operating environment and automatically adjusts itself to maintain desired... |
|
 GPRS NetworksGPRS is principally an overlay network for existing GSM networks which enables all the benefits of packet switched networks to be available to mobile devices. Due to the delay in 3G rollout, operators worldwide are increasingly implementing services based on GPRS, once seen by many as simply a stepping-stone between GSM and UMTS. If you are... |  |  Asterisk HackingAsterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all... |  |  Managing Corporate Information Systems Evolution and MaintenanceManaging Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of systems evolution to managerial aspects of the topic. It includes very contemporary issues such as evolving legacy systems to e-business, applying patterns for reengineering... |
|
 IP LocationIn today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,... |  |  Cryptography for Internet & Database ApplicationsCryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest... |  |  Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores
Get up to speed on Cocoa and Objective-C, and start developing applications on the iOS and OS X platforms. If you don’t have experience with Apple’s developer tools, no problem! From object-oriented programming to storing app data in iCloud, the fourth edition of this book covers everything you need to build apps for the... |
|
|
|
Result Page: 47 46 45 44 43 42 41 40 39 38 |