Home | Amazing | Today | Tags | Publishers | Years | Search 
Microoptics
Microoptics
“…revised and extended…an essential book for those interested in knowing more about the subject.” (Measurement and Control, Vol.38, No.2, March 2005)

"If you were wondering what microoptics actually is or how it is specifically defined, then this book not only provides the answer but represents a...

Broadband Microwave Amplifiers (Artech House Microwave Library)
Broadband Microwave Amplifiers (Artech House Microwave Library)
Offers a complete understanding of state-of-the-art techniques for designing and fabricating broadband microwave amplifiers. Illustrates the formulation of small- and large-signal device models to help accurately simulate amplifier performance.

About the Author
...
Visual Basic 2008 Recipes: A Problem-Solution Approach
Visual Basic 2008 Recipes: A Problem-Solution Approach
Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium of practical solutions for busy VB .NET programmers. Create time for the more interesting aspects of your VB .NET project by solving common problems with the practical solutions and dozens of code examples in this...
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications
The Open Mobile Alliance: Delivering Service Enablers for Next-Generation Applications

A practical overview of OMA specifications and how they enable mobile multimedia services & much more …!

The Open Mobile Alliance (OMA) is an industry forum, which develops open specifications to help in the creation of applications and services to be deployed over converged networks. The alliance is...

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Software Testing and Quality Assurance: Theory and Practice
Software Testing and Quality Assurance: Theory and Practice
A superior primer on software testing and quality assurance, from integration to execution and automation

This important new work fills the pressing need for a user-friendly text that aims to provide software engineers, software quality professionals, software developers, and students with the fundamental developments in testing theory and...

Software Defined Radio for 3G (Artech House Mobile Communications Series)
Software Defined Radio for 3G (Artech House Mobile Communications Series)
If you’re a mobile communications engineer considering software radio solutions, this practical resource is essential reading. It covers systems design and partitioning all the way from the antenna to the management and control software. Various options for hardware are provided including a look at current and state of the art silicon...
Basic NEC with Broadcast Applications
Basic NEC with Broadcast Applications
The development of computer programs for modeling antennas began in the 1960s when main-frame computers were making advancements. Modeling codes that could run on desktop computers made their appearance in the early 1980s. The design of directional antenna arrays for medium-frequency (MF) broadcasting stations has a much longer history, however,...
Therapeutic Proteins: Methods and Protocols (Methods in Molecular Biology)
Therapeutic Proteins: Methods and Protocols (Methods in Molecular Biology)

With the recent completion of the sequencing of the human genome, it is widely anticipated that the number of potential new protein drugs and targets will escalate at an even greater rate than that observed in recent years. However, identification of a potential target is only part of the process in developing these new next generation...

Japan's Software Factories: A Challenge to U.S. Management
Japan's Software Factories: A Challenge to U.S. Management

Though Japan has successfully competed with U.S. companies in the manufacturing and marketing of computer hardware, it has been less successful in developing computer programs. This book contains the first detailed analysis of how Japanese firms have tried to redress this imbalance by applying their skills in engineering and production...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Battlespace Technologies: Network-Enabled Information Dominance (Artech House Intelligence and Information Operations)
Battlespace Technologies: Network-Enabled Information Dominance (Artech House Intelligence and Information Operations)

The era of mechanized warfare is rapidly giving way to the battle for information superiority enabled by electronic technologies that provide data for detailed analysis of enemy forces and capabilities. Supported with over 400 color photographs and illustrations, this new book is written and designed specifically to help non-specialists...

Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy