Home | Amazing | Today | Tags | Publishers | Years | Search 
Hand Surgery. 2 Volume Set
Hand Surgery. 2 Volume Set

The bones of the hand and wrist, which are linked by synovial joints, provide a mobile yet stable framework that is crucial for strenuous work and fine manipulative activity. A built-in mechanism of...

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Bluetooth Essentials for Programmers
Bluetooth Essentials for Programmers
This book provides an introduction to Bluetooth programming, with a specific focus on developing real code. The authors discuss the major concepts and techniques involved in Bluetooth programming, with special emphasis on how they relate to other networking technologies. They provide specific descriptions and examples for creating applications in...
Advances in Database Technology - EDBT 2004
Advances in Database Technology - EDBT 2004
This book constitutes the refereed proceedings of the 9th International Conference on Extending Database Technology, EDBT 2004, held in Heraklion, Crete, Greece, in March 2004.

The 42 revised full papers presented together with 2 industrial application papers, 15 software demos, and 3 invited contributions were carefully reviewed and selected...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Computing in Object-Oriented Parallel Environments: Second International Symposium, Iscope 98, Santa Fe, Nm, Usa, December 8-11, 1998
Computing in Object-Oriented Parallel Environments: Second International Symposium, Iscope 98, Santa Fe, Nm, Usa, December 8-11, 1998
This book constitutes the refereed proceedings of the Second International Symposium on Computing in Object-Oriented Parallel Environments, ISCOPE 98, held in Santa Fe, NM, USA, in December 1998. The 10 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings from a total of 39 submissions. Also included...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Signal Processing for Wireless Communications
Signal Processing for Wireless Communications
Master the Signal Processing Concepts and Techniques Needed to Design and Operate Any Wireless Communications Network

Signal Processing for Wireless Communications offers communications engineers an application-focused guide to the essential concepts and techniques of wireless signal processing. This comprehensive...

Advances in Network and Distributed Systems Security (IFIP International Federation for Information Processing)
Advances in Network and Distributed Systems Security (IFIP International Federation for Information Processing)
The more our society relies on electronic forms of communication, the more the security of these communication networks is essential for its well-functioning. As a consequence, research on methods and techniques to improve network security is extremely important.
Topics in this volume include the latest developments in:
Online! The Book
Online! The Book
Are you getting the best of the Internet? No way! The Web's packed with great sites you haven't discovered. Great tools you haven't tried. Great stuff you haven't done.

But that's about to change!

You're looking at an amazing collection of today's coolest Web stuff. Hundreds of incredible ideas, tips, techniques, and sites...all...

Programming Visual Basic for the Palm OS (O'Reilly Palm)
Programming Visual Basic for the Palm OS (O'Reilly Palm)

This book provides comprehensive coverage of software application development for the Palm, using the Visual Basic (VB) language. In this book, we'll illustrate Palm development using a variety of software techniques, but we'll focus on a new Visual Basic compiler for the Palm: the AppForge Add-in for Microsoft Visual Basic....

UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
Building on the success of the first edition, UMTS Networks second edition allows readers to continue their journey through UMTS up to the latest 3GPP standardization phase, Release 5. Containing revised, updated and brand new material, it provides a comprehensive view on the UMTS network architecture and its latest developments....
Result Page: 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy