Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile phones are no longer just a means of calling another person. In several countries, mobile devices are used to pay for merchandise, receive time sensitive information and send e-mail messages. Additionally, corporations use mobile phones to access critical business information and send tasks to field workers, regardless of time or...
Worldwide Wi-Fi: Technological Trends and Business Strategies
Worldwide Wi-Fi: Technological Trends and Business Strategies

Your success guide to the next wireless revolution

The next watershed innovation in wireless technology is here: IEEE 802.11 wireless local area networks (LANs).

Recent studies from IDC indicate that the Wi-Fi wireless LAN market will likely account for ninety percent of projected LAN equipment revenues by...

Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

The Light Fantastic: A Modern Introduction to Classical and Quantum Optics
The Light Fantastic: A Modern Introduction to Classical and Quantum Optics
"Provides a nice mix of elementary physical optics with practical and exciting applications."--Stephen Barnett, University of Strathclyde

This book presents a thorough and self-contained introduction to modern optics, covering in full the three components ray optics, wave optics, and quantum optics. The text covers all
...
Broadband Internet Deployment in Japan (Advanced Information Technology)
Broadband Internet Deployment in Japan (Advanced Information Technology)
Japan is well-known as the country where the penetration ratio of the intelligent cellular phone system is large. In 2007, it was reported that in the cellular phone system in Japan, the total volume of data traffic became larger than that of voice traffic. Now, the telecommunication infrastructure is going to be converged with broadcasting...
Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n
Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n
The first version of the 802.11 standard was ratified in 1997 after seven long years of development. However, initial adoption of this new technology was slow, partly because of the low penetration of devices that needed the “freedom of wireless.”

The real opportunity for 802.11 came with the increased popularity of laptop
...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Modeling, Sensing and Control of Gas Metal Arc Welding
Modeling, Sensing and Control of Gas Metal Arc Welding
Hardbound. Arc welding is one of the key processes in industrial manufacturing, with welders using two types of processes - gas metal arc welding (GMAW) and gas tungsten arc welding (GTAW). This new book provides a survey-oriented account of the modeling, sensing, and automatic control of the GMAW process. Researchers are presented with the most...
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Information and Communications Technologies OECD Communications Outlook 2007
Information and Communications Technologies OECD Communications Outlook 2007
The OECD Communications Outlook provides an extensive range of indicators for different types of communications networks and compares performance indicators such as revenue, investment, employment and prices for service throughout the OECD area. These indicators are essential for industry and for regulators who use benchmarking to evaluate policy...
Renewable Energy (Energy Science and Engineering)
Renewable Energy (Energy Science and Engineering)
The present edition has been updated in a number of renewable energy technology areas (Chapter 4 and 5), where progress have been made over the recent years. New solar simulation studies have been added to Chapter 6, and market considerations have been included in the overview in Chapter 1, and in discussing industry liberalisation in Chapter 7....
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy