Home | Amazing | Today | Tags | Publishers | Years | Search 
Fundamentals of Sensor Network Programming: Applications and Technology
Fundamentals of Sensor Network Programming: Applications and Technology

Sensor processing is a central and an important problem in aerospace/defense, automation, medical imaging, and robotics, to name only a few areas. A surveillance system used in aerospace and defense is an example of a sensor processing system. It uses devices such as infrared sensors, microwave radars, and laser radars that are...

Professional Issues in Software Engineering
Professional Issues in Software Engineering

It is widely recognized that a professional engineer needs to be aware of a range of issues much wider than the mere technical knowledge necessary to practice the chosen engineering discipline. The Engineering Council, for example, requires that the formation of a professional engineer should include, amongst other things,

...

E-Mail Marketing For Dummies (Business & Personal Finance)
E-Mail Marketing For Dummies (Business & Personal Finance)

E-mail isn’t a new technology any more, but you can do a lot of new things with e-mail marketing. E-mail can be delivered to mobile devices and can integrate nicely into a social media marketing strategy.

Still, the same challenges that existed in the past apply to the new world of e-mail marketing. Namely,...

Testing IT: An Off-the-Shelf Software Testing Process
Testing IT: An Off-the-Shelf Software Testing Process

Why is astronomy considered a science while astrology is considered only a pseudoscience? In other words, how can we prove that a theory faithfully describes reality, and that this theory can then be used to predict unknown facts? Karl Popper, the well-known philosopher, studied these problems and summarized his conclusions in one...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Introduction to Wireless and Mobile Systems
Introduction to Wireless and Mobile Systems

We are pleased and honored to present this third edition of Introduction toWireless and Mobile Systems. Wireless and mobile communication technologies are advancing at an unprecedented rate, and the timely release of the third edition is our endeavor to keep pace with this rapid technological evolution.

This text explains the...

Introduction to MATLAB for Engineers
Introduction to MATLAB for Engineers

Formerly used mainly by specialists in signal processing and numerical analysis, MATLAB® in recent years has achieved widespread and enthusiastic acceptance throughout the engineering community. Many engineering schools now require a course based entirely or in part on MATLAB early in the curriculum. MATLAB is programmable and has...

Codin' for the Web: A Designer's Guide to Developing Dynamic Web Sites
Codin' for the Web: A Designer's Guide to Developing Dynamic Web Sites

EVEN THE MOST SKILLED WEB DESIGNERS can find the complexities of creating a full-functioned Web site to be a daunting task. Here to help designers create sites that not only work, but work well and are easy to update and maintain is an easy-to-read guide to Web programming basics from best-selling author Charles Wyke-Smith. Just as architects...

Internet & World Wide Web: How to Program (4th Edition)
Internet & World Wide Web: How to Program (4th Edition)

Welcome to Internet and web programming and Internet & WorldWide Web How to Program, Fourth Edition! At Deitel & Associates, we write programming language textbooks and professional books for Prentice Hall, deliver corporate training worldwide and develop Web 2.0 Internet businesses. The book has been...

CCNP Security VPN 642-647 Official Cert Guide
CCNP Security VPN 642-647 Official Cert Guide

This book is designed to help you prepare for the Cisco VPN certification exam. The VPN exam is one in a series of exams required for the Cisco Certified Network Professional - Security (CCNP - Security) certification. This exam focuses on the application of security principles with regard to Cisco IOS routers,...

Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches
Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches

Since the first part of the twentieth century, cybernetics and systems research have been developed as scientific disciplines. Investigations, launched in the area of cybernetics, previously dealt with control and information processing. In a more narrow sense, they consisted in the consideration of analogies of the control and the...

Programmable Logic Controllers
Programmable Logic Controllers

Programmable logic controllers (PLCs) continue to evolve as new technologies are added to their capabilities. The PLC started out as a replacement for hardwired relay control systems. Gradually, various math and logic manipulation functions were added. Today PLCs are the controller of choice for the vast majority of automated...

Result Page: 282 281 280 279 278 277 276 275 274 273 272 271 270 269 268 267 266 265 264 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy