Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ESD in Silicon Integrated Circuits
ESD in Silicon Integrated Circuits

In the seven years since the first edition of this book was completed, Electrostatic Discharge (ESD) phenomena in integrated circuits (IC) continues to be important as technologies shrink and the speed and size of the chips increases. The phenomena related to ESD events in semiconductor devices take place outside the realm of normal device...

Java How to Program, 7th Edition
Java How to Program, 7th Edition

The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. The Seventh Edition has been extensively fine-tuned and is completely up-to-date with Sun Microsystems, Inc.’s...

Chronic Fatigue Syndrome (Diseases and Disorders)
Chronic Fatigue Syndrome (Diseases and Disorders)

Examines the symptoms, treatment options, and mystery of chronic fatigue syndrome, ongoing research into its causes, and how to live with this disease.

CHARLES BEST, ONE of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the...

Phobias (Diseases and Disorders)
Phobias (Diseases and Disorders)
Human beings have a love/hate relationship with fear. Medals are given to valiant warriors who charge fearlessly into combat, while those who sneak around whimpering in their battle helmets are labeled cowards and in some cultures are even put to death for what is considered a war-time crime. As a whole, people generally find fear to be...
IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Audio Signal Processing for Next-Generation Multimedia Communication Systems
Audio Signal Processing for Next-Generation Multimedia Communication Systems
This book has its origins in the Multimedia Communications Research Center at Bell Laboratories. It will likely be the last thing coming from this Center, since it no longer exists. This book reflects our vision on next-generation multimedia communication systems, shared by many researchers who worked with us at a time in the last several years in...
Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

CCIE Prep Kit 350-001 Routing and Switching (Exam Guide)
CCIE Prep Kit 350-001 Routing and Switching (Exam Guide)
The CCIE Routing and Switching Exam Guide prepares you to pass the CCIE written exam. This book covers all necessary objectives for the exam with a tutorial text that is strictly exam-related and flows with minimal interruption. Key concepts are the only "notes" set apart from the text by special formatting. This series is designed to for...
MMS: Technologies, Usage and Business Models 
MMS: Technologies, Usage and Business Models 
MMS will reshape mobile communication, making it more personal, versatile, and expressive than ever before.

Drawing on the authors’ hands-on experience in developing, billing and delivering Multimedia Messaging Services (MMS), this innovative book addresses how MMS will affect existing network and...

WiMAX Handbook (McGraw-Hill Communications)
WiMAX Handbook (McGraw-Hill Communications)
Get a thorough introduction to WiMAX--the revolutionary new 802.16 IEEE standard for point-to-point and point-to-multipoint wireless broadband access. Written by networking expert Frank Ohrtman, this detailed guide annotates the 802.16 specification and explains how to design and build a robust, reliable, and secure WiMAX network that takes full...
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)
802.11 Wireless Networks: Security and Analysis (Computer Communications and Networks)

This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every...

Learning Together Online: Research on Asynchronous Learning Networks
Learning Together Online: Research on Asynchronous Learning Networks
This book is about the past and future of research on the effectiveness of learning networks, a type of e-learning, online learning, Web-based learning, computer-supported collaborative learning, or virtual classroom (to use a number of common terms) in which students and teachers learn together online. The formal term is ...
Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy