Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Data Management in Cloud, Grid and P2P Systems: 6th International Conference, Globe 2013, Prague, Czech Republic, August 28-29, 2013, Proceedings (Lecture Notes in Computer Science)
Data Management in Cloud, Grid and P2P Systems: 6th International Conference, Globe 2013, Prague, Czech Republic, August 28-29, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed proceedings of the 6th International Conference on Data Management in Grid and Peer-to-Peer Systems, Globe 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 10 revised full papers presented were carefully reviewed and selected from 19 submissions. The papers are...

Beginning NFC: Near Field Communication with Arduino, Android, and PhoneGap
Beginning NFC: Near Field Communication with Arduino, Android, and PhoneGap

Jump into the world of Near Field Communications (NFC), the fast-growing technology that lets devices in close proximity exchange data, using radio signals. With lots of examples, sample code, exercises, and step-by-step projects, this hands-on guide shows you how to build NFC applications for Android, the Arduino microcontroller,...

POP3 und IMAP
POP3 und IMAP
There is very little specialist literature available on IMAP servers, and no current documentation deals with the subject in sufficient depth.

There is a real need for a guide to IMAP. A quick look at relevant mailing lists shows that they are full of questions and problems, indicating that the software solutions
...
Sams Teach Yourself TCP/IP in 24 Hours, Third Edition
Sams Teach Yourself TCP/IP in 24 Hours, Third Edition
Welcome to Sams Teach Yourself TCP/IP in 24 Hours, Third Edition. This book provides a clear and concise introduction to TCP/IP for newcomers, and also for users who have worked with TCP/IP but would like a little more of the inside story. The third edition includes new material on recent developments in TCP/IP and...
Encyclopedia of GIS (Springer Reference)
Encyclopedia of GIS (Springer Reference)
The Encyclopedia of GIS provides a comprehensive and authoritative guide, contributed by experts and peer-reviewed for accuracy, and alphabetically arranged for convenient access. The entries explain key software and processes used by geographers and computational scientists. Major overviews are provided for nearly 200 topics: Geoinformatics,...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy