Home | Amazing | Today | Tags | Publishers | Years | Search 
Computing in Object-Oriented Parallel Environments: Second International Symposium, Iscope 98, Santa Fe, Nm, Usa, December 8-11, 1998
Computing in Object-Oriented Parallel Environments: Second International Symposium, Iscope 98, Santa Fe, Nm, Usa, December 8-11, 1998
This book constitutes the refereed proceedings of the Second International Symposium on Computing in Object-Oriented Parallel Environments, ISCOPE 98, held in Santa Fe, NM, USA, in December 1998. The 10 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings from a total of 39 submissions. Also included...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Advances in Database Technology - EDBT 2004
Advances in Database Technology - EDBT 2004
This book constitutes the refereed proceedings of the 9th International Conference on Extending Database Technology, EDBT 2004, held in Heraklion, Crete, Greece, in March 2004.

The 42 revised full papers presented together with 2 industrial application papers, 15 software demos, and 3 invited contributions were carefully reviewed and selected...

Bluetooth Essentials for Programmers
Bluetooth Essentials for Programmers
This book provides an introduction to Bluetooth programming, with a specific focus on developing real code. The authors discuss the major concepts and techniques involved in Bluetooth programming, with special emphasis on how they relate to other networking technologies. They provide specific descriptions and examples for creating applications in...
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Hand Surgery. 2 Volume Set
Hand Surgery. 2 Volume Set

The bones of the hand and wrist, which are linked by synovial joints, provide a mobile yet stable framework that is crucial for strenuous work and fine manipulative activity. A built-in mechanism of...

Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control
Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control
This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended conference has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromagnetics, communications, information technology and...
WiMAX: A Wireless Technology Revolution
WiMAX: A Wireless Technology Revolution
The demand for broadband connectivity is growing rapidly, but cannot be met effectively by existing wireline technology. WiMAX has the potential to provide widespread Internet access that can usher in economic growth, better education and healthcare, and improved entertainment services. Examining the technology's global development and deployment...
Broadband Wireless Communications Business: An Introduction to the Costs and Benefits of New Technologies
Broadband Wireless Communications Business: An Introduction to the Costs and Benefits of New Technologies

With the emergence of broadband wireless communication systems, new business opportunities have appeared for operators, content provides, and manufacturers.

Broadband wireless communications technologies promise the freedom of constant access to the Internet at high speeds, without the limitation of connection...

RF Microelectronics (Communications Engineering and Emerging Technologies Series)
RF Microelectronics (Communications Engineering and Emerging Technologies Series)
The annual worldwide sales of cellular phones has exceeded $2.5B. With 4.5 million customers, home satellite networks comprise a $2.5B industry. The global positioning system is expected to become a $5B market by the year 2000. In Europe, the sales of equipment and services for mobile communications will reach $30B by 1998. The statistics are...
Patterns for Computer-Mediated Interaction (Wiley Software Patterns Series)
Patterns for Computer-Mediated Interaction (Wiley Software Patterns Series)
The Internet has changed the way we interact and communicate. Two to three decades ago the only way to stay in touch with people was to see them in person, write letters, or use a fixed network phone. At work, we had video conferencing and fax, but that was basically it. The Internet was available, but only few of us actually had an e-mail...
Result Page: 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy