Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Electromagnetics for RF and Microwave Engineering
Computational Electromagnetics for RF and Microwave Engineering
The numerical approximation of Maxwell's equations, Computational Electromagnetics (CEM), has emerged as a crucial enabling technology for radio-frequency, microwave and wireless engineering. The three most popular 'full-wave' methods - the Finite Difference Time Domain Method, the Method of Moments, and the Finite Element Method - are introduced...
Materials for Electronic Packaging
Materials for Electronic Packaging
Consists of 16 self-contained chapters, contributed by a variety of active researchers from industrial, academic and governmental sectors.
Addresses the need of materials scientists/engineers, electrical engineers, mechanical engineers, physicists and chemists to acquire a thorough knowledge of materials science.
Explains how
...
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Wireless Home Networking Simplified
Wireless Home Networking Simplified

Using today’s wireless networks, you can save money, become more productive, and even have more fun! Now, there’s an easy, fully illustrated step-by-step guide to wireless networking for your home: Wireless Home Networking Simplified.

 

...

Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Evolving Web services standards and technologies offer limited interoperability when it comes to security, management, and other important application characteristics. Successful interoperability solutions require comprehensive integration strategies that go beyond simple connections. The capability to mitigate security and reliability risks and...
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Fedora Core 7 & Red Hat Enterprise Linux: The Complete Reference
Fedora Core 7 & Red Hat Enterprise Linux: The Complete Reference
The Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringing to the PC all the power and flexibility of a Unix workstation as well as a complete set of Internet applications and a fully functional desktop interface. This book is designed not only to be a complete reference on Linux, but also to provide clear...
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a contribution to the accounting and auditing...

Case Studies in Reliability and Maintenance (Wiley Series in Probability and Statistics)
Case Studies in Reliability and Maintenance (Wiley Series in Probability and Statistics)
For both the manufacturer and the purchaser, reliability is one of the most important characteristics defining the quality of a product or system. High reliability is achieved through design efforts, choice of materials and other inputs, production, quality assurance efforts, proper maintenance, and many related decisions and...
WebSphere Application Server 7.0 Administration Guide
WebSphere Application Server 7.0 Administration Guide
As an administrator you need a secure, scalable, resilient application infrastructure to support the developers building and managing J2EE applications and Service Oriented Architecture services. WebSphere application server, a product from IBM, is optimized to ease administration and improve runtime performance. It helps you run applications and...
Mastering Microsoft Exchange Server 2003
Mastering Microsoft Exchange Server 2003
All the Documentation You Need for Successfully Deploying Exchange Server 2003

Author Barry Gerber shares his extensive real-world experience in...

Advances in Modeling and Design of Adhesively Bonded Systems
Advances in Modeling and Design of Adhesively Bonded Systems

The book comprehensively charts a way for industry to employ adhesively bonded joints to make systems more efficient and cost-effective

Adhesively bonded systems have found applications in a wide spectrum of industries (e.g., aerospace, electronics, construction, ship building, biomedical, etc.) for a variety of purposes....

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy