Home | Amazing | Today | Tags | Publishers | Years | Search 
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's Internet of People gives way to tomorrow's Internet of Things where billions of...
Managing Information Communication Technology Investments in Successful Enterprises
Managing Information Communication Technology Investments in Successful Enterprises
"The digital business world is undergoing phenomenal and sometimes turbulent changes. The digital economy has also seen the rise of entirely new businesses. Traditional bricks and mortar businesses are scrambling to become e-commerce businesses simply to survive in this new era. Whether in original economy or digital, IT investment is...
Extreme Programming with Ant: Building and Deploying Java Applications with JSP, EJB, XSLT, XDoclet, and JUnit (Developers Library)
Extreme Programming with Ant: Building and Deploying Java Applications with JSP, EJB, XSLT, XDoclet, and JUnit (Developers Library)
You've heard about Extreme Programming. You might have read articles or books describing the XP process, but what next? How do you implement XP principles into an actual Java project? This unique book explains everything you need for XP development, starting with Ant, the popular Java build tool. The authors describe every stage of a real-world...
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Wireless personal area networks and wireless sensor networks are rapidly gaining popularity, and the IEEE 802.15 Wireless Personal Area Working Group has defined no less than three different standards so as to cater to the requirements of different applications. One of them is the low data rate WPAN known as 802.15.4, which covers a broad range of...
Learn MS Access 2000 Programming by Example (With CD-ROM)
Learn MS Access 2000 Programming by Example (With CD-ROM)
Are you ready to go beyond the basics to fully exploit the power of Microsoft Access? Do you want to build powerful applications that provide enhanced functionality and increase user productivity? You can easily make an Access database do a whole lot more than can be achieved with the provided user interface. All you need is this book and a desire...
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language that is at the core of SQL Server 2008. Learn to create databases, insert and update data, generate reports, secure your data, and more. Author Joseph Sack takes common...
Software Requirements: Styles & Techniques
Software Requirements: Styles & Techniques
Most IT systems fail to meet expectations. They don't meet business goals and don't support users efficiently. Why? Because the requirements didn't address the right issues. Writing a good requirements specification doesn't take more time. This book shows how it¿s done - many times faster and many times smarter.  What are the...
Abstract State Machines - Theory and Applications: International Workshop, ASM 2000 Monte Verita, Switzerland, March 19-24, 2000 Proceedings
Abstract State Machines - Theory and Applications: International Workshop, ASM 2000 Monte Verita, Switzerland, March 19-24, 2000 Proceedings
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Abstract State Machines, ASM 2000, held in Monte Verita, Switzerland in March 2000.

The 12 revised full papers presented were carefully reviewed and selected from 30 submissions. Also included are an introductory overview, two reports on
...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
ECOOP 2004 - Object-Oriented Programming: 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings
ECOOP 2004 - Object-Oriented Programming: 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings
ECOOP is the premier forum in Europe for bringing together practitioners, researchers, and students to share their ideas and experiences in a broad range of disciplines woven with the common thread of object technology. It is a collage of events, including outstanding invited speakers, carefully refereed technical papers, practitioner reports...
Microsoft Office Access 2007 QuickSteps
Microsoft Office Access 2007 QuickSteps
Step-by-Step, Full-Color Graphics!

Get started using Access 2007 right away--the QuickSteps way. Color screenshots and clear instructions show you how to use all the new and improved features. Follow along and learn to work with the new Office interface and ribbon, create databases and tables, and enter and edit data. You'll...

Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy