Home | Amazing | Today | Tags | Publishers | Years | Search 
CCNA Wireless Official Exam Certification Guide  (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide
  • Master IUWNE 640-721 exam topics with the official study guide
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with Exam Preparation Tasks
  • Practice with realistic exam questions on the CD-ROM
...
Next Generation Wireless Applications
Next Generation Wireless Applications
"There is no other book I've come across that offers this breadth of knowledge and makes you that excited about the possibilities in this fast paced market. Next Generation Wireless Applications is written in a very accessible way and packed full of useful insights from the author reflecting his extensive experience...
Cognitive Wireless Communication Networks
Cognitive Wireless Communication Networks
The proposed book includes a set of research and survey articles featuring the recent advances in theory and applications of cognitive radio technology for the next generation (e.g., fourth generation) wireless communication networks. Cognitive radio has emerged as a promising technology for maximizing the utilization of the limited radio bandwidth...
php/architect's Guide to Enterprise PHP Development
php/architect's Guide to Enterprise PHP Development

We live in a fast-paced world. Looking over the last decade, the world has changed so radically - politically, economically and culturally - that it’s difficult to believe only 10 years have passed. Technology is certainly no exception. It’s easy to overlook the huge changes in the way technology is used in our daily lives - because...

Advances in Crytology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security
Advances in Crytology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security

This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009.

The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in...

Building Telephony Systems with OpenSIPS 1.6
Building Telephony Systems with OpenSIPS 1.6

SIP is the most important VoIP protocol and OpenSIPS is clearly the open source leader in VoIP platforms based on pure SIP. The whole telecommunication industry is changing to an IP environment, and telephony in the way we know today will disappear in less than ten years. SIP is the protocol leading this disruptive revolution and it is one of...

Neurocritical Care (Cambridge Medicine)
Neurocritical Care (Cambridge Medicine)

Very few hospitals have dedicated neurointensive care units for management of critically ill neurological and neurosurgical patients. Frequently, these patients are managed in the medical or surgical ICU by non-neurologists, who have a hard time appreciating the delicate needs of these patients. This book is a straightforward, practical...

Professional XMPP Programming with JavaScript and jQuery (Wrox Programmer to Programmer)
Professional XMPP Programming with JavaScript and jQuery (Wrox Programmer to Programmer)

Create real-time, highly interactive apps quickly with the powerful XMPP protocol

XMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice and video conferencing, collaborative spaces, real-time gaming, data synchronization, and search. This book teaches you how to harness the...

Mobile IPv6: Protocols and Implementation
Mobile IPv6: Protocols and Implementation

Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide (i.e., cellular systems, VoIP handovers over LAN, multi-access network handovers, location privacy, enterprise mobile networking, etc.). 

This book covers the IPv6 host mobility protocol known as "mobile IPv6"...

Mac OS X Snow Leopard Server For Dummies
Mac OS X Snow Leopard Server For Dummies

Making Everything Easier!

Mac OS® X Snow Leopard Server for Dummies

Learn to:

  • Set up and configure a Mac network with Snow Leopard Server

  • Administer, secure, and troubleshoot the network

  • Incorporate a Mac subnet into a Windows Active...

IP Design for Mobile Networks
IP Design for Mobile Networks

As the cellular world and the Internet converge, mobile networks are transitioning from circuit to packet and the Internet Protocol (IP) is now recognized as the fundamental building block for all next-generation communication networks. The all-IP vision provides the flexibility to deliver cost-effective services and...

Microsoft SQL Server 2008 Analysis Services Unleashed
Microsoft SQL Server 2008 Analysis Services Unleashed

As the foundation of the Microsoft Business Intelligence Strategy, Microsoft SQL Server 2008 Analysis Services provides users with faster access to data and even more tools for managing and analyzing data across multidimensional objects (databases, dimensions, cubes).

 

...
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy