Home | Amazing | Today | Tags | Publishers | Years | Search 
Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -...
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)

This book provides a complete and comprehensive overview of 3G UMTS charging services

Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile...

Beginning OpenOffice 3: From Novice to Professional
Beginning OpenOffice 3: From Novice to Professional
Office suites are one of the most popular types of software, and most computer users will, at some point, find themselves staring at the user interface of a word processor, spreadsheet, or presentation package. Traditionally, office suites have been quite expensive packages, but thanks to the generosity of Sun Microsystems and a massive community...
Encyclopedia of Multimedia Technology and Networking
Encyclopedia of Multimedia Technology and Networking
Multimedia technology and networking are changing at a remarkable rate. Despite the telecoms crash of 2001, innovation in networking applications, technologies, and services has continued unabated. The exponential growth of the Internet, the explosion of mobile communications, the rapid emergence of electronic commerce, the restructuring of...
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
Next Generation SSH2 Implementation: Securing Data in Motion
Next Generation SSH2 Implementation: Securing Data in Motion
The most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book
...
High-Powered Investing All-In-One For Dummies (Business & Personal Finance)
High-Powered Investing All-In-One For Dummies (Business & Personal Finance)
Looking for help making smarter, more profitable high-end investment decisions? Why buy ten books that cover each of the major topics you need to understand, when High-Powered Investing All-In-One For Dummies gives you ten expert guide for the price of one?

This hands-on resource arms you with an arsenal of advanced investing...

Reliability and Statistics in Geotechnical Engineering
Reliability and Statistics in Geotechnical Engineering

Probabilistic reasoning, statistical methods, and measures of engineering judgment are combined to develop a quantified approach for analyzing and managing risks in civil engineering systems and the applied earth sciences. The resulting risk analysis approach described in this book reflects an emerging trend in geotechnical engineering, natural...

Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Fundamentals of Air Pollution, Fourth Edition
Fundamentals of Air Pollution, Fourth Edition
A compendium for all involved directly or indirectly in decision making about air pollution control-regulatory or engineering.

Fundamentals of Air Pollution is an important and widely used textbook in the environmental science and engineering community. Written shortly after the passage of the seminal Clean Air Act
...
Atoms, Radiation, and Radiation Protection (Physics Textbook)
Atoms, Radiation, and Radiation Protection (Physics Textbook)
Since the preparation of the second edition (1995) of Atoms, Radiation, and Radiation Protection, many important developments have taken place that affect the profession of radiological health protection. The International Commission on Radiological Protection (ICRP) has issued new documents in a number of areas that are addressed in this third...
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy