Home | Amazing | Today | Tags | Publishers | Years | Search 
GSM & UMTS: The Creation of Global Mobile Communications
GSM & UMTS: The Creation of Global Mobile Communications
GSM (Global System for Mobile communication) provides a service to more than 500 million users throughout 168 countries worldwide. It is the world market leader serving 69 0f all mobile digital users and is currently evolving into UMTS (Universal Mobile Telecommunication System).

By describing the critical decisions and the phases of the...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this...

Object-Oriented Analysis and Design with Applications (2nd Edition)
Object-Oriented Analysis and Design with Applications (2nd Edition)
In this eagerly awaited second edition, Grady Booch draws upon the rich and varied results of those projects and offers improved methods for object development and a new, unified notation. With numerous examples implemented in C++, Booch illustrates essential concepts, explains the method, and shows successful applications in a variety of fields....
JNCIE: Juniper Networks Certified Internet Expert Study Guide
JNCIE: Juniper Networks Certified Internet Expert Study Guide
Greetings and welcome to the world of Juniper Networks. This introductory section serves
as a location to pass on to you some pertinent information concerning the Juniper Networks
Technical Certification Program. In addition, you’ll find information about how the book itself
is laid out and what it contains. Finally,
...
Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
Sams Teach Yourself Windows XP All in One (2nd Edition)
Sams Teach Yourself Windows XP All in One (2nd Edition)

If you're new to the world of Windows XP and are daunted by the thought of having to figure it all out on your own, Sams Teach Yourself Windows XP All in One can help. This all-inclusive reference book will teach you how to not only use your Windows XP system, but also how to utilize digital media and Internet features. Learn how to set...

CCSP: Secure Intrusion Detection and SAFE Implementation Study Guide (642-531 and 642-541)
CCSP: Secure Intrusion Detection and SAFE Implementation Study Guide (642-531 and 642-541)
This Study Guide is an introduction to the Cisco security certification. It will help improve your
Cisco security skills so that you can have more opportunities for a better job or job security.
Security experience has been a hot job skill and it will continue to be because networks need
security. Cisco has been pushing further into
...
Hacking GMail (ExtremeTech)
Hacking GMail (ExtremeTech)
Welcome to Hacking Gmail. Thanks for buying this book. If you haven’t bought it,
you should. It’s very good, and once you buy it you can stop loitering around the
bookstore stacks. Go on: Buy it, sit down, have a coffee. See? Comfier isn’t it? Ah.
Hacking Gmail. It’s a manly hobby, and this book will tell you
...
Visual C++ in 12 Easy Lessons/Book and Cd-Rom
Visual C++ in 12 Easy Lessons/Book and Cd-Rom
Visual C++ in 12 Easy Lessons is aimed primarily at beginning programmers who have never programmed or have
never seen a C++ program. Text, questions, exercises, and numerous program listings are aimed at both beginning
programmers and those new to Visual C++.

If you already program but have never had the time to tackle Visual
...
Understanding Information Transmission (IEEE Press Understanding Science &Technology Series)
Understanding Information Transmission (IEEE Press Understanding Science &Technology Series)
Understanding Information Transmission introduces you to the entire field of information technology. In this consumer handbook and introductory student resource, seven chapters span the gamut of the field—the nature, storage, transmission, networking, and protection of information. In addition to the science and technology, this book...
Isometric Game Programming with DirectX 7.0 w/CD
Isometric Game Programming with DirectX 7.0 w/CD
Isometric Game Programming with DirectX takes you from zero to DirectX, literally! Beginning with game programming basics you will explore such topics as WIN32 programming basics, GDI fundamentals, fonts, regions and bitmaps, DirectDraw, and Game Logic. You'll then move on to Isometric fundamentals and methodology as well as advanced topics such as...
Mac OS X Programming
Mac OS X Programming
Mac OS X Programming assumes nothing on the part of its reader, other than common sense and an interest in learning how to use Carbon to write software applications for modern Macintosh computers. Therefore, it'll serve you well if you've chosen Mac OS X as the operating system under which you'll take your first steps as a novice...
Result Page: 1135 1134 1133 1132 1131 1130 1129 1128 1127 1126 1125 1124 1123 1122 1121 1120 1119 1118 1117 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy