Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach

This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment

Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book...

Disruption by Design: How to Create Products that Disrupt and then Dominate Markets
Disruption by Design: How to Create Products that Disrupt and then Dominate Markets

From Eli Whitney to Henry Ford to Ray Kroc to Steve Jobs, market disruptors have reaped the benefits, including fame and fortune. But do you have to be that rare genius whose unique skills can literally change the world? No. Disrupting a market is a discipline that can be learned. Disruption by Design—a handbook for...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Meta-Algorithmics: Patterns for Robust, Low Cost, High Quality Systems
Meta-Algorithmics: Patterns for Robust, Low Cost, High Quality Systems

The confluence of cloud computing, parallelism and advanced machine intelligence approaches has created a world in which the optimum knowledge system will usually be architected from the combination of two or more knowledge-generating systems. There is a need, then, to provide a reusable, broadly-applicable set of design patterns to empower...

Securing Social Media in the Enterprise
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This...

Coaching Positively: Lessons for Coaches from Positive Psychology (Coaching in Practice)
Coaching Positively: Lessons for Coaches from Positive Psychology (Coaching in Practice)

"If you are looking for an introductory book on how to do PP coaching, this will give you an excellent, clearly written, practical introduction with some useful references in the bibliography."
AICTP Newsletter, November 2012

"Coaching Positively is the book that the coaching profession...

Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

Predictive Analytics For Dummies
Predictive Analytics For Dummies

Combine business sense, statistics, and computers in a new and intuitive way, thanks to Big Data Predictive analytics is a branch of data mining that helps predict probabilities and trends. Predictive Analytics For Dummies explores the power of predictive analytics and how you can use it to make valuable predictions for your business, or in...

Software Development on a Leash (Expert's Voice)
Software Development on a Leash (Expert's Voice)

Software Development on a Leash is designed as a roadmap for experienced developers and architects who are interested in implementing a turbocharged software development process that encourages reuse and innovation. Author David Birmingham's products have been successfully deployed in a variety of venues, including...

The String Instrument Owner's Handbook
The String Instrument Owner's Handbook

In The String Instrument Owner’s Guide, Michael Pagliaro surveys the complete “ownership life cycle” of bowed string instruments. A touchstone work for uninitiated and advanced players, The String Instrument Owner’s...

Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications (Control Engineering)
Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications (Control Engineering)
It has long been the goal of engineers to develop tools that enhance our ability to do work, increase our quality of life, or perform tasks that are either beyond our ability, too hazardous, or too tedious to be left to human efforts. Autonomous mobile robots are the culmination of decades of research and development, and their potential is...
C# Essentials (2nd Edition)
C# Essentials (2nd Edition)
Concise but thorough, this second edition of C# Essentials introduces the Microsoft C# programming language, including the Microsoft .NET Common Language Runtime (CLR) and .NET Framework Class Libraries (FCL) that support it. This book's compact format and terse presentation of key concepts serve as a roadmap to the...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy