Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice Over IP Crash Course
Voice Over IP Crash Course
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also...
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Immunopharmacology of Platelets (Handbook of Immunopharmacology)
Immunopharmacology of Platelets (Handbook of Immunopharmacology)
Although anucleated, blood platelets are extraordinarily efficient cells and still the subject of fruitful investigations in haematology, in vascular physiology, in biochemistry, and more recently in immunology and in physiopathology where their metabolism has been implicated as a source of potential effector compounds. It...
Mastering Clojure Data Analysis
Mastering Clojure Data Analysis

Leverage the power and fl exibility of Clojure through this practical guide to data analysis

About This Book

  • Explore the concept of data analysis using established scientific methods combined with the powerful Clojure language
  • Master Naive Bayesian Classification, Benford's Law, and...
Microsoft® SharePoint 2003 UNLEASHED Second Edition
Microsoft® SharePoint 2003 UNLEASHED Second Edition

As businesses attempt to maximize every employee hour, knowledge management and collaboration tools like SharePoint 2003 have become more popular. Now businesses turn their attention to maximize this tool. Microsoft SharePoint 2003 Unleashed, Second Edition can show you how to do this. Revised...

Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Nowadays data accumulate at an alarming speed in various storage devices,
and so does valuable information. However, it is difficult to understand information
hidden in data without the aid of data analysis techniques, which
has provoked extensive interest in developing a field separate from machine
learning. This new field is
...
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Logistic systems constitute one of the cornerstones in the design and control of production systems and the modelling of supply chains. They are key to a number of industries, and courses teaching logistics systems planning and control are becoming more widespread. Introduction to Logistics Systems Planning and Control is the first book to...
Deploying Windows 2000 with Support Tools
Deploying Windows 2000 with Support Tools
Visually, Windows 2000 is similar to previous versions of Windows. Its extensive new functionality, the overriding goal of which is to reduce an organization's "total cost of ownership," however, makes the system administrator's life easier. This translates to quicker software installation, more efficient management, and easier...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services, Second Editionbuilds on the success of the previous best-selling edition, providing comprehensive coverage of IMS – its concepts, architecture, protocols and functionalities with a wealth of new and updated material. Mobile telephony with the current technology has been hugely...
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
unlimited object storage image
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy