Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
VoIP Service Quality : Measuring and Evaluating Packet-Switched Voice
VoIP Service Quality : Measuring and Evaluating Packet-Switched Voice
VoIP SAVINGS AND FLEXIBILITY! TELEPHONE-LINE QUALITY?

Despite the features that make Voice over IP so attractive from the standpoint of cost and flexibility of telephone services, businesses will only adopt it once they’ve determined whether, and under what circumstances, the quality of VoIP will be satisfactory to...

Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical...
Knowledge Based Radar Detection, Tracking and Classification
Knowledge Based Radar Detection, Tracking and Classification
This book brings together the key concepts essential for the application of Knowledge Based Systems (KBS) to radar detection, tracking, classification, and scheduling. It highlights the latest advances in the field and forecasts the impact of KB technology on future systems, including civilian, military, and homeland defense applications....
Encyclopedia of Prisoners of War and Internment
Encyclopedia of Prisoners of War and Internment
This invaluable A-to-Z reference work presents nearly 300 entries that survey the history of prisoners of war and interned civilians from the earliest times to the present, with emphasis on the nineteenth and twentieth centuries. It explores such themes as famous prisoners of war throughout history, medical conditions, atrocities, escapes,...
The Metacolonial State: Pakistan, Critical Ontology, and the Biopolitical Horizons of Political Islam (Antipode Book Series)
The Metacolonial State: Pakistan, Critical Ontology, and the Biopolitical Horizons of Political Islam (Antipode Book Series)

'An urgent and extraordinary book. Weaving a philosophical analysis of Heidegger, Agamben and Foucault, Jan draws out the implications of their thought for a radical analysis of the ontological politics of Islam and Pakistan. Whether writing about the 'Ulama and Deoband schools, blasphemy laws, the military, beards, or the...

Net-Centric Approaches to Intelligence and National Security (Kluwer International Series in Engineering and Computer Science)
Net-Centric Approaches to Intelligence and National Security (Kluwer International Series in Engineering and Computer Science)
This volume considers the web architectures and recent developments that make net-centric approaches for intelligence and national security possible. The development of net-centric approaches for intelligence, national and homeland security applications has become a major concern in many areas such as defense intelligence and national and...
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Stratonauts: Pioneers Venturing into the Stratosphere
Stratonauts: Pioneers Venturing into the Stratosphere

Just what does it take to be a stratonaut, soaring to higher and higher altitudes of Earth's atmosphere? Brave men and women have reached extreme heights in balloons, aircraft and rocket ships over the past two centuries, from the first untethered balloon flight to the first flights in the newly defined stratosphere, through to the...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Design Engineering: A Manual for Enhanced Creativity
Design Engineering: A Manual for Enhanced Creativity
As with any art, science, or discipline, natural talent is only part of the equation. Consistent success stems from honing your skills, cultivating good techniques, and hard work. Design engineering, a field often considered an intuitive process not amenable to scientific investigation, is no exception. Providing descriptive theory, broad context,...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

You Are a Mathematician: A Wise and Witty Introduction to the Joy of Numbers
You Are a Mathematician: A Wise and Witty Introduction to the Joy of Numbers

What is the largest number less than 1?

If x and y are any of two different positive numbers, which is larger, x2 + y2 or 2xy?

What do you get if you cross a cube and an octahedron?

Discover the surprising answers as David Wells conclusively proves that: you Are a mathematician

Praise for David Wells's

The...

unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy