Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
National Electrical Code 2005 Handbook on CD-ROM (International Electrical Code)
National Electrical Code 2005 Handbook on CD-ROM (International Electrical Code)
Produced by the NFPA, the popular National Electrical Code® 2005 Handbook CD-ROM contains the complete text of the 2005 edition of the NEC® supplemented by helpful facts and figures, full-color illustrations, real-world examples and expert commentary. Loaded with more National Electrical Code® information than any other...
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

Technologies for Home Networking
Technologies for Home Networking
A broad overview of the home networking field, ranging from wireless technologies to practical applications

In the future, it is expected that private networks (e.g., home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP-based services, and possibly becoming service providers...

Principles of the Institutional Law of International Organizations (Cambridge Studies in International and Comparative Law)
Principles of the Institutional Law of International Organizations (Cambridge Studies in International and Comparative Law)
'Principles of the Institutional Law of International Organizations is still one of the best general works available on organizations.' Netherlands International Law Review

'... analytical and explanatory, and the author reasons and discusses issues in depth. ... answers hypothetical questions where the development in legislation or
...
Lineman and Cablemans Field Manual, Second Edition
Lineman and Cablemans Field Manual, Second Edition
A Compact, On-the-Job Reference for Linemen and Cablemen

Fully updated with the latest NEC and OSHA standards, this one-stop portable guide contains the crucial electrical data, formulas, calculations, and safety information essential at any jobsite. The Lineman's and Cableman's Field Manual, Second Edition,...

Security and Privacy in Biometrics
Security and Privacy in Biometrics

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and...

Practical Troubleshooting of Electrical Equipment and Control Circuits (Practical Professional Books from Elsevier)
Practical Troubleshooting of Electrical Equipment and Control Circuits (Practical Professional Books from Elsevier)
There is a large gap between what you learn in college and the practical knowhow demanded in the working environment, running and maintaining electrical equipment and control circuits. Practical Troubleshooting Of Electrical Equipment and Control Circuits focuses on the hands-on knowledge and rules-of-thumb that will help engineers and employers by...
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
Sure you’re vulnerable.
Now here’s what you do about it

Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard...

Pro Open Source Mail: Building an Enterprise Mail Solution
Pro Open Source Mail: Building an Enterprise Mail Solution

Providing the range of mail-related services expected by organizations can be a confusing, daunting process. Pro Open Source Mail: Building an Enterprise Mail Solution presents a comprehensive guide to managing the most important e-mail services, including user administration, mail transfer agents, remote e-mail access, virus...

Joomla! Web Security
Joomla! Web Security
In Detail

Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,...

20 Recipes for Programming MVC 3: Faster, Smarter Web Development
20 Recipes for Programming MVC 3: Faster, Smarter Web Development

There's no need to reinvent the wheel every time you run into a problem with ASP.NET's Model-View-Controller (MVC) framework. This concise cookbook provides recipes to help you solve tasks many web developers encounter every day. Each recipe includes the C# code you need, along with a complete working example of how to...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy