Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Server-side GPS and Assisted-GPS in Java (Artech House Gnss Technologies and Applications)
Server-side GPS and Assisted-GPS in Java (Artech House Gnss Technologies and Applications)

Assisted-GNSS is an interesting field to work in at present. Demand for accurate location is increasing and new satellites and signals are coming online through the GPS modernization program and the emergence of new GNSSs.

This book is a practical exploration of A-GNSS with particular focus on A-GPS. It provides some theoretical...

Protein Nanotechnology: Protocols, Instrumentation, and Applications (Methods in Molecular Biology)
Protein Nanotechnology: Protocols, Instrumentation, and Applications (Methods in Molecular Biology)
This third edition volume expands on the previous editions with updated approaches and techniques used to study protein nanotechnology and the future of nanomaterial compositions. This book is organized into Three Parts: Part One looks at recombinant protein expression in insect cells, and methods to produce molecular motors,...
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing...
Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)

CD Features More Than 200 Practice Questions

 

CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...

Chemosensitivity: Volume II: In Vivo Models, Imaging, and Molecular Regulators (Methods in Molecular Medicine)
Chemosensitivity: Volume II: In Vivo Models, Imaging, and Molecular Regulators (Methods in Molecular Medicine)

A state-of-the art collection of readily reproducible laboratory methods for assessing chemosensitivity in vitro and in vivo, and for assessing the parameters that modulate chemosensitivity in individual tumors. Chemosensitivity,Volume 2: In Vivo Models, Imaging, and Molecular Regulators contains cutting-edge protocols for classifying tumors...

Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Universal Serial Bus (USB) is one of the most important developments in PC peripheral interconnect technology since the introduction of serial and parallel ports in the early 1980's. It is fast becoming the port of choice for many new digital video conferencing cameras, scanners, monitors, PC telephony equipment, and Human Interface Devices such as...
Transactions on Petri Nets and Other Models of Concurrency III
Transactions on Petri Nets and Other Models of Concurrency III

These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are published as LNCS volumes, and hence are widely distributed and indexed. This Journal has its own Editorial Board which selects papers based on a...

Head First iPhone and iPad Development: A Learner's Guide to Creating Objective-C Applications for the iPhone and iPad
Head First iPhone and iPad Development: A Learner's Guide to Creating Objective-C Applications for the iPhone and iPad

Let's say you have a killer app idea for iPhone and iPad. Where do you begin? Head First iPhone and iPad Development will help you get your first application up and running in no time. You'll not only learn how to design for Apple's devices, you'll also master the iPhone SDK tools -- including Interface...

New Directions of Modern Cryptography
New Directions of Modern Cryptography

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy