Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications
Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications
Exclusively dedicated to Mobile TV, this book provides a detailed insight to mobile multimedia characterized efficient compression techniques, protocols formalized by 3GPP or 3GPP2, capabilities of broadcast, and mobile networks for delivering multimedia content. Network requirements such as spectrum; chipsets, software and handsets which enable...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Red Hat Fedora Linux 3 For Dummies
Red Hat Fedora Linux 3 For Dummies
Get online with broadband DSL and build Web pages

Install Fedora Core 3, use OpenOffice.org, play CDs, and set up a firewall

The penguin is back, and better than ever! And this friendly guide will help you install and configure the new edition of Fedora Core so you can use exciting features like the SELinux infrastructure, which...

Silverlight 2 Bible
Silverlight 2 Bible

Create Web 2.0 applications from the inside out

Create rich, cross-platform, interactive Web applications with Microsoft's new Silverlight and this essential guide. Designers will discover how to add animation, audio, video, and other high-impact effects. Programmers will cover Visual Studio®, .NET, and other programming tools, and...

Geometric Spanner Networks
Geometric Spanner Networks
Aimed at an audience of researchers and graduate students in computational geometry and algorithm design, this book uses the Geometric Spanner Network Problem to showcase a number of useful algorithmic techniques, data structure strategies, and geometric analysis techniques with many applications, practical and theoretical. The authors present...
trixbox CE 2.6
trixbox CE 2.6

The open source telephony platform trixbox CE is designed to implement a PBX system with features typically reserved for large enterprise businesses. trixBox allows an individual or organization to set up a telephone system with traditional telephone networks as well as internet-based telephony or VoIP. The task is time consuming and involves a...

Official Ubuntu Server Book, The (2nd Edition)
Official Ubuntu Server Book, The (2nd Edition)

Ubuntu Server is a complete, free server operating system that just works, with the extra Ubuntu polish, innovation, and simplicity that administrators love.

Now, there’s a definitive, authoritative guide to getting up-and-running quickly with the newest, most powerful versions of Ubuntu Server. Written...

Biosimulation in Drug Development
Biosimulation in Drug Development
Drug development is far from a straightforward endeavor. It starts with the identification of a pharmaceutically promising substance, the potential of which is further investigated in near-exhausting physiological analyses (Chapter 1). If it is found effective, this does not necessarily mean that we know all the molecular...
VMware Cookbook: A Real-World Guide to Effective VMware Use
VMware Cookbook: A Real-World Guide to Effective VMware Use

With scores of step-by-step solutions, this cookbook helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the basics—how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute them among virtual machines—but also how to...

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Creating Development Environments with Vagrant
Creating Development Environments with Vagrant

Vagrant is a tool for building complete development environments. With an easy-to-use workflow and focus on automation, Vagrant lowers development environment setup time, increases development/production parity, and makes the "it works on my machine" excuse a thing of the past.

"Creating Development Environments with...

Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition
Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition

Master the capabilities of PostgreSQL 11 to efficiently manage and maintain your database

Key Features

  • Master advanced concepts of PostgreSQL 11 with real-world datasets and examples
  • Explore query parallelism, data replication, and database performance while working with...
unlimited object storage image
Result Page: 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy