|
|
|
|
|
A Model for Calculating Interconnection Costs in TelecommunicationsThe liberalization of the telecommunications markets in Sub-Saharan Africa led to increased competition on the provision and pricing of communication services. But, due to the lack of appropriate regulatory tools, newly established regulators are poorly equipped to arbitrate increasing interconnection disputes between competing operators.
... | | Minimal Perl: For UNIX and Linux PeopleNo-nonsense and practical, yet with wit and charm. A joy to read." -Dan Sanderson, Software Developer, Amazon.com
"Shows style, not just facts-valuable." -Brian Downs, former Training Director, Lucent Technologies
"Brilliant, never tedious-highly recommended!" -Jon Allen, Maintainer of... | | An Introduction to Programming with Mathematica, Third Edition
"Essential...a welcome addition to the literature. The choice of topics and their presentation are lucidly informed by considerable experience. The writing style is straightforward and clear. The authors stick resolutely to their goal of producing an introductory text, not a complete treatment, on programming in Mathematica. As such it... |
|
|
Active Directory Cookbook, 3rd EditionWhen you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura... | | Mechanical Behavior of Materials
Everything that surrounds us is matter. The origin of the word matter
is mater (Latin) or matri (Sanskrit), for mother. In this sense, human
beings anthropomorphized that which made them possible – that
which gave them nourishment. Every scientific discipline concerns
itself with matter. Of all matter surrounding us, a... | | Security MonitoringHow well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic... |
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |