Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks
The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides high-speed, high-bandwidth efficiency and high-capacity multimedia services for both residential and enterprise applications. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks examines the basic concepts,...
Problem Solving With Prolog
Problem Solving With Prolog
Prolog is a programming language in which solutions to computing problems are expressed as facts representing relationships between objects and as rules specifying consequences which derive from facts. In Prolog, the mechanisms for representing knowledge about objects and relationships are both high-level and general-purpose. This brings two...
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Cabling: The Complete Guide to Network Wiring
Cabling: The Complete Guide to Network Wiring

The physical linkages responsible for carrying a company's data continue to be the most neglected components of the typical network-to the extent that nearly 70% of all network-related problems result from poor cabling.

In this the second edition of a much-needed and warmly welcomed book, three networking experts share their...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Polyurethane and Related Foams: Chemistry and Technology
Polyurethane and Related Foams: Chemistry and Technology
Polyurethane foams debuted over 60 years ago. At the present time these types of foams make up the largest segment in the thermosetting foam industry. This book describes polyurethane (PUR) and urethane linkage-modified polyisocyanurate (PIR) foams. A characteristic of these foams lies in the versatility of their physical...
Ethernet in the First Mile
Ethernet in the First Mile
IEEE standard 802.3, Ethernet in the First Mile (EFM), approved this July, standardizes broadband Ethernet, allowing service providers to focus on providing critical broadband services without worrying about interoperability conflicts. This book will annotate and explain the dense language of the standard document, taking particular care how to...
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Guide to Information Sources in Mathematics and Statistics (Reference Sources in Science and Technology)
Guide to Information Sources in Mathematics and Statistics (Reference Sources in Science and Technology)
This book was conceived as a reference for librarians, mathematicians, and statisticians involved in college- and research-level mathematics and statistics in the twenty-first century. Now in a time of transition in scholarly communications in mathematics, practices that have changed little for a hundred years are giving way to new modes of...
Broadband Internet Deployment in Japan (Advanced Information Technology)
Broadband Internet Deployment in Japan (Advanced Information Technology)
Japan is well-known as the country where the penetration ratio of the intelligent cellular phone system is large. In 2007, it was reported that in the cellular phone system in Japan, the total volume of data traffic became larger than that of voice traffic. Now, the telecommunication infrastructure is going to be converged with broadcasting...
Multimedia Interaction and Intelligent User Interfaces: Principles, Methods and Applications
Multimedia Interaction and Intelligent User Interfaces: Principles, Methods and Applications

Consumer electronics (CE) devices, providing multimedia entertainment and enabling communication, have become ubiquitous in daily life. However, consumer interaction with such equipment currently requires the use of devices such as remote controls and keyboards, which are often inconvenient, ambiguous and non-interactive. An important...

Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)

Let’s just look it right in the eye and call it out. We in the IT industries have been barraged with the buzzwords over and over again since we rolled into the new millennium: the transition to utility computing, or grid computing, or cloud computing (depending on the source/exact month/position of the stars in the sky). We’ve...

unlimited object storage image
Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy