Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Mathematical Formulas and Integrals, Fourth Edition
Handbook of Mathematical Formulas and Integrals, Fourth Edition
This book contains a collection of general mathematical results, formulas, and integrals that occur throughout applications of mathematics. Many of the entries are based on the updated fifth edition of Gradshteyn and Ryzhik’s ”Tables of Integrals, Series, and Products,” though during the preparation of the book, results were also...
Microformats: Empowering Your Markup for Web 2.0
Microformats: Empowering Your Markup for Web 2.0
Microformats burst onto the scene a couple of years ago and are fast becoming an essential tool for all professional web designers and developers. Imagine being able to integrate all of your web-based contact details, tagged articles, and geographical information seamlessly in web and desktop applications, without having to add anything extra to...
Cognitive Radio Technology (Communications Engineering)
Cognitive Radio Technology (Communications Engineering)
Cognitive radio technology is a smarter, faster, and more efficient way to transmit information to and from fixed, mobile, other wireless communication devices. Cognitive radio builds upon software-defined radio technology. A cognitive radio system is 'aware' of its operating environment and automatically adjusts itself to maintain desired...
GPRS Networks
GPRS Networks
GPRS is principally an overlay network for existing GSM networks which enables all the benefits of packet switched networks to be available to mobile devices. Due to the delay in 3G rollout, operators worldwide are increasingly implementing services based on GPRS, once seen by many as simply a stepping-stone between GSM and UMTS.  If you are...
Asterisk Hacking
Asterisk Hacking
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all...
Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of systems evolution to managerial aspects of the topic. It includes very contemporary issues such as evolving legacy systems to e-business, applying patterns for reengineering...
IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores
Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores

Get up to speed on Cocoa and Objective-C, and start developing applications on the iOS and OS X platforms. If you don’t have experience with Apple’s developer tools, no problem! From object-oriented programming to storing app data in iCloud, the fourth edition of this book covers everything you need to build apps for the...

Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Logistic systems constitute one of the cornerstones in the design and control of production systems and the modelling of supply chains. They are key to a number of industries, and courses teaching logistics systems planning and control are becoming more widespread. Introduction to Logistics Systems Planning and Control is the first book to...
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
KI 2004: Advances in Artificial Intelligence: 27th Annual German Conference in AI, KI 2004, Ulm, Germany, September 20-24, 2004
KI 2004: Advances in Artificial Intelligence: 27th Annual German Conference in AI, KI 2004, Ulm, Germany, September 20-24, 2004
KI 2004 was the 27th edition of the annual German Conference on Artificial Intelligence, which traditionally brings together academic and industrial researchers

from all areas of AI and which enjoys increasing international attendance. KI 2004 received 103 submissions from 26 countries. This volume contains the 30 papers that were
...
unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy