Home | Amazing | Today | Tags | Publishers | Years | Search 
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
Object-Oriented Technology. ECOOP 2004 Workshop Reader: ECOOP 2004 Workshop, Oslo, Norway, June 14-18, 2004, Final Reports (Lecture Notes in Computer Science)
Object-Oriented Technology. ECOOP 2004 Workshop Reader: ECOOP 2004 Workshop, Oslo, Norway, June 14-18, 2004, Final Reports (Lecture Notes in Computer Science)
This year, for the eighth time, the European Conference on Object-Oriented Programming (ECOOP) series, in cooperation with Springer, is glad to offer the object-oriented research community the ECOOP 2004 Workshop Reader, a compendium of workshop reports pertaining to the ECOOP 2004 conference, held in Oslo from June 15 to 19, 2004.

ECOOP
...
Internet QoS: Architectures and Mechanisms for Quality of Service (The Morgan Kaufmann Series in Networking)
Internet QoS: Architectures and Mechanisms for Quality of Service (The Morgan Kaufmann Series in Networking)

"What I really like about this book is that it cuts through the vast amount of noise about QoS in the Internet, and pulls out the core ideas (integrated and differentiated services, MPLS, and traffic engineering) in plain and simple technical prose. Internet QoS presents a balanced view of the various technologies and relates them...

Trends in Functional Programming 6
Trends in Functional Programming 6
This book contains selected papers from the proceedings presented at the Sixth Symposium on Trends in Functional Programming (TFP05). Continuing the TFP series with its previous instances held in Stirling (1999), St. Andrews (2000), Stirling (2001), Edinburgh (2003) and Munich (2004) the symposium was held in Tallinn, Estland in co-location with...
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications...
Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
The Thermodynamic Universe: Exploring the Limits of Physics
The Thermodynamic Universe: Exploring the Limits of Physics
Particle Physics and High Energy Physics have stagnated since the early 1970s. Now, the underlying principle of reductionism -- so sacred to twentieth-century physics -- is itself being questioned. This book examines these tumultuous developments that are leading to a paradigm shift and a new horizon for Physics.

Presenting the new paradigm...

Absolute Beginner's Guide to Personal Firewalls
Absolute Beginner's Guide to Personal Firewalls

The Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal...

Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications

How to Design a Secure Multimedia Encryption Scheme

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Physics for Radiation Protection: A Handbook
Physics for Radiation Protection: A Handbook

A highly practical resource for health physicists and other professionals in radiation protection. The new edition has been completely revised and updated. New chapters were added on internal radiation dose and the environmental behavior of radionuclides, as well as a new section on log-normal distribution of environmental...

Collective Intelligence in Action
Collective Intelligence in Action
There's a great deal of wisdom in a crowd, but how do you listen to a thousand people talking at once? Identifying the wants, needs, and knowledge of internet users can be like listening to a mob.

In the Web 2.0 era, leveraging the collective power of user contributions, interactions, and feedback is the key to market dominance. A new...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy