Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks
LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

A concise introduction to IMT-Advanced Systems, including LTE-Advanced and WiMAX

There exists a strong demand for fully extending emerging Internet services, including collaborative applications and social networking, to the mobile and wireless domain. Delivering such services can be possible only through realizing broadband...

Cuckoo Malware Analysis
Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox

Overview

  • Learn how to analyze malware in a straightforward way with minimum technical skills
  • Understand the risk of the rise of document-based malware
  • Enhance your malware analysis concepts through illustrations, tips and tricks,...
EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
Fully revised for the very latest EnCE exam and EnCase software

EnCE certification tells the world that you've not only mastered the use of EnCase Forensic Software, but also that you have acquired the in-depth forensics knowledge and techniques you need to conduct complex computer examinations. This official study guide,...

Excel Dashboards and Reports (Mr. Spreadsheet's Bookshelf)
Excel Dashboards and Reports (Mr. Spreadsheet's Bookshelf)

Learn to use Excel dashboards and reports to better conceptualize data

Updated for all the latest features and capabilities of Excel 2013, this go-to resource provides you with in-depth coverage of the individual functions and tools that can be used to create compelling Excel reports. Veteran author Michael Alexander walks...

Applied Engineering Failure Analysis: Theory and Practice
Applied Engineering Failure Analysis: Theory and Practice

Applied Engineering Failure Analysis: Theory and Practice provides a point of reference for engineering failure analysis (EFA) cases, presenting a compilation of case studies covering a 35-year period, from the 1970s to 2012. This period spans the era from the time when slide rules were used routinely for...

Carpenter's Complete Guide to the SAS REPORT Procedure
Carpenter's Complete Guide to the SAS REPORT Procedure
Art Carpenter demystifies the powerful REPORT procedure and shows you how to incorporate this highly flexible and customizable procedure into your SAS reporting programs. Combining his years of SAS experience with a talent for instruction, Art offers clear and comprehensive coverage that demonstrates how valuable this procedure is for both...
Crystal Reports 2008: The Complete Reference (Complete Reference Series)
Crystal Reports 2008: The Complete Reference (Complete Reference Series)

Your One-Stop Guide to Enterprise Reporting with Crystal Reports 2008

Transform disconnected corporate data into compelling, interactive business intelligence using all of the powerful tools available in Crystal Reports 2008. Through detailed explanations, real-world examples, and expert advice, this comprehensive guide...

Google Web Toolkit 2 Application Development Cookbook
Google Web Toolkit 2 Application Development Cookbook

GWT 2 radically improves web experience for users by using existing Java tools to build no-compromise AJAX for any modern browser. It provides a solid platform so that other great libraries can be built on top of GWT. Creating web applications efficiently and making them impressive, however, is not as easy as it sounds. Writing web...

FusionCharts Beginner’s Guide: The Official Guide for FusionCharts Suite
FusionCharts Beginner’s Guide: The Official Guide for FusionCharts Suite
As web developers, we build applications that feed on data. We parse it, process it, and report it. Our reports take the form of tables, grids, and diagrams such as charts, gauges, and maps. Parsing and processing are backend tasks that are invisible to the user. The actual reporting of data, however, is a bulk of an experience a...
Hesitant Fuzzy Sets Theory (Studies in Fuzziness and Soft Computing)
Hesitant Fuzzy Sets Theory (Studies in Fuzziness and Soft Computing)

This book provides the readers with a thorough and systematic introduction to hesitant fuzzy theory. It presents the most recent research results and advanced methods in the field. These includes: hesitant fuzzy aggregation techniques, hesitant fuzzy preference relations, hesitant fuzzy measures, hesitant fuzzy clustering algorithms and...

Microsoft VBScript Professional Projects
Microsoft VBScript Professional Projects

Use VBScript to accomplish real-world, professional tasks. Incorporating four hands-on projects, Microsoft VBScript Professional Projects is your key to unlocking the power of VBScript. Each project focuses on a specific concept and is based on a real-world situation. You will be able to use the skills that you develop throughout...

Learning Nagios 3.0
Learning Nagios 3.0

Nagios is a tool for system and network monitoring. It constantly checks other machines and various services on those machines. The main purpose of system monitoring is to detect and report any system not working properly as soon as possible--so that you are aware of problems before a user runs into them. It is a modular and flexible solution...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy