Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
The IBM Totalstorage Solutions Handbook (IBM Redbooks)
The IBM Totalstorage Solutions Handbook (IBM Redbooks)

This IBM Redbook provides overviews and pointers for information on the most current IBM TotalStorage products, showing how IBM is uniquely positioned to help you build up an on-demand business, considering its depth and breadth of storage IT experience and strong lineup of products, solutions, and services.

This Redbook is divided into...

IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
This succinct new edition of our best-selling title presents everything you need know to get up and running with C sockets programming in one affordable volume!

The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to
...
Sterile Filtration: A Practical Approach
Sterile Filtration: A Practical Approach

This book focuses on sterilizing grade filters in the biopharmaceutical industry, emphasizing practical applications of universal and dependable operational protocols, integrity testing, and troubleshooting to streamline the production and preparation of pharmaceuticals.

Addresses the complexities of globalizing redundancy in
...

Clojure for Java Developers
Clojure for Java Developers

Key Features

  • Write apps for the multithreaded world with Clojure's flavor of functional programming
  • Discover Clojure's features and advantages and use them in your existing projects
  • The book is designed so that you'll be able put to use your existing skills and software knowledge...
Beginning Swift: Master the fundamentals of programming in Swift 4
Beginning Swift: Master the fundamentals of programming in Swift 4

Swift greatly simplifies the process of developing applications for Apple devices. This book provides you with the essential skills to help you get started with developing applications using Swift.

Key Features

  • Teaches you how to correctly structure and architect software using Swift
  • ...
Mobile Telecommunications Protocols for Data Networks
Mobile Telecommunications Protocols for Data Networks
Technology has changed our lives and the way we see the world. The growing use of mobile technologies in phones, computers and everyday applications has fuelled the demand for efficient connectivity, irrespective of the location of the device. This connectivity has to be provided by various different networks and protocols that guarantee the smooth...
Mobile and Wireless Communications Networks: IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks
Mobile and Wireless Communications Networks: IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks
This book draws together papers presented at the IFIP/IEEE Sixth Conference on Mobile and Wireless Communications. It focuses on the convergence of mobile wireless networks and the Internet, in particular, integrating stand-alone mobile networks with infrastructure wireless networks to create more robust and accommodating wireless networks....
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Absolute Beginner's Guide to Networking, Fourth Edition
Absolute Beginner's Guide to Networking, Fourth Edition

Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the...

Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
unlimited object storage image
Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy