Home | Amazing | Today | Tags | Publishers | Years | Search 
Electronic Business in Developing Countries: Opportunities and Challenges
Electronic Business in Developing Countries: Opportunities and Challenges
Most of the literature covering electronic business focused on the developed world. Electronic Business in Developing Countries: Opportunities and Challenges provides a chance to get to know more electronic business applications, successes, failures, challenges and opportunities in the developing world. These studies are gaining importance for...
Microsoft Access 2002 Bible BK+CD
Microsoft Access 2002 Bible BK+CD
"The Best book out there … I used this book so much I wore out the binding."—Don Dimon, MCSE, MCP+I, Senior Programmer/Analyst If Access 2002 can do it, you can do it too … Client lists. Sales figures. Product inventories. In today's networked, Internet-everywhere world, you need to get a grip on your data — and...
Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
Critically acclaimed text for computer performance analysis—now in its second edition

The Second Edition of this now-classic text provides a current and thorough treatment of queueing systems, queueing networks, continuous and discrete-time Markov chains, and simulation. Thoroughly updated with...

Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Programming Embedded Systems: With C and GNU Development Tools
Programming Embedded Systems: With C and GNU Development Tools

If you have programming experience and a familiarity with C--the dominant language in embedded systems--Programming Embedded Systems, Second Edition is exactly what you need to get started with embedded software. This software is ubiquitous, hidden away inside our watches, DVD players, mobile...

Managing Multimedia Semantics
Managing Multimedia Semantics
Managing multimedia semantics is a complex task because content creators and archivists describe and interpret semantics associated with the multimedia content in several ways, depending on the context and use of the information. Disciplines such as computer vision and pattern recognition, multimedia database management and modeling, and film...
Computers and Productivity: How Firms Make a General Purpose Technology Work
Computers and Productivity: How Firms Make a General Purpose Technology Work
Information and communication technologies (ICTs) create potentials for considerable productivity gains and for higher economic growth. However, ICTs also pose varied challenges to firms in order to benefit from these potentials. Highlighting the importance of innovations, firm-sponsored training, and recruitment of high-skilled workers, this...
The Ultimate Palm Robot
The Ultimate Palm Robot

No programming required--CD includes software

Now, anyone curious about robotics can inexpensively build and enjoy their very own robot using any Palm handheld for the brains. Originally developed by Carnegie Mellon University robotics department graduate students, this prototype has enjoyed a cult following among enthusiasts. Using...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Third Generation Wireless Communications, Volume 1: Post Shannon Signal Architectures
Third Generation Wireless Communications, Volume 1: Post Shannon Signal Architectures
...fundamental concepts, the latest design techniques and the most advanced architectures for tackling wireless communications problems...covers source coding, baseband signal shaping, adaptive air interfaces, and much more.

This is a book about the technological foundations of the next generation of wireless networks, including the
...
Sams Teach Yourself J2EE in 21 Days
Sams Teach Yourself J2EE in 21 Days

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

Result Page: 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy