Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Scala (Animal Guide)
Programming Scala (Animal Guide)
Learn how to be more productive with Scala, a new multi-paradigm language for the Java Virtual Machine (JVM) that integrates features of both object-oriented and functional programming. With this book, you'll discover why Scala is ideal for highly scalable, component-based applications that support concurrency and distribution.

...
Principles of Spread-Spectrum Communication Systems
Principles of Spread-Spectrum Communication Systems
The goal of this book is to provide a concise but lucid explanation and derivation
of the fundamentals of spread-spectrum communication systems. Although
spread-spectrum communication is a staple topic in textbooks on digital communication,
its treatment is usually cursory, and the subject warrants a more
intensive exposition.
...
Managing and Securing a Cisco SWAN
Managing and Securing a Cisco SWAN
Wireless networking is all about freedom. Freedom is a worthy goal in its own right, and freedom in an organizational context pays dividends.

It’s tremendously cool to be able to sit down in an office or conference room, open your portable computer, and have instant connectivity to the resources you need to do your job.With
...
Rituals of Triumph in the Mediterranean World (Culture and History of the Ancient Near East)
Rituals of Triumph in the Mediterranean World (Culture and History of the Ancient Near East)

Societies, both ancient and modern, have frequently celebrated and proclaimed their military victories through overt public demonstrations. In the ancient world, however, the most famous examples of this come from a single culture and period - Rome in the final years of the Roman Republic and early Roman Empire - while those from other...

Creating Games in C++ : A Step-by-Step Guide
Creating Games in C++ : A Step-by-Step Guide
Do you love video games? Ever wondered if you could create one of your own, with all the bells and whistles? It's not as complicated as you'd think, and you don't need to be a math whiz or a programming genius to do it. In fact, everything you need to create your first game, "Invasion of the Slugwroths," is included in this book and...
Hack Proofing Your Network (Second Edition)
Hack Proofing Your Network (Second Edition)
This book is intended to teach skills that will be useful for breaking into computers.
If that statement shocks you, then you probably aren’t familiar with the
legitimate reasons for hacking.These reasons can be security testing, consumer
advocacy and civil rights, military interests, and “hacktivist” politics;
...
Microsoft SharePoint: Building Office 2007 Solutions in VB 2005 (Expert's Voice in Sharepoint)
Microsoft SharePoint: Building Office 2007 Solutions in VB 2005 (Expert's Voice in Sharepoint)
Microsoft SharePoint: Building Office 2007 Solutions in VB 2005 is the third edition of Scot Hillier's market-leading SharePoint book. The new version includes extensive updates from the previous editions, with a complete focus on SharePoint 2007 and its integration with the 2007 Microsoft Office System. This edition also features new...
Fuel Cell Research Trends
Fuel Cell Research Trends
A fuel cell is an electrochemical energy conversion device. It produces electricity from external supplies of fuel (on the anode side) and oxidant (on the cathode side). These react in the presence of an electrolyte. Generally, the reactants flow in and reaction products flow out while the electrolyte remains in the cell. Fuel...
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management

Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies...

Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
In the time of Duke Huan of Ch’i [the position of] the son of Heaven had become humble and weak, while the feudal lords used their energies in attacking [one another]. The Southern Yi and Northern Ti engaged the Central States in battle, and the continued existence of the Central States seemed [to hang by] a thin thread...
Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy