Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control (Control Engineering)
Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control (Control Engineering)
The purpose of this book is to initiate the newcomer into the control of computer and wireless communication networks, one of the fastest growing fields in the engineering world. Technical concepts, which are at the core of the design, implementation, research and invention of computer network and wireless communication network control protocols,...
104 Number Theory Problems: From the Training of the USA IMO Team
104 Number Theory Problems: From the Training of the USA IMO Team
This challenging problem book by renowned US Olympiad coaches, mathematics teachers, and researchers develops a multitude of problem-solving skills needed to excel in mathematical contests and research in number theory. Offering inspiration and intellectual delight, the problems throughout the book encourage students to express their ideas,...
Network Management Fundamentals
Network Management Fundamentals
Network management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just...
Web Marketing For Dummies (Computer/Tech)
Web Marketing For Dummies (Computer/Tech)
Claim your space in the online marketplace!

Develop a plan, build a marketing-effective site, and create word-of-Web campaigns

Launching a Web site for your product or service does not automatically ensure sales success. This book provides the know-how for creating a solid Web marketing plan, including how to build a site...

Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

VBScript, WMI, and ADSI Unleashed: Using VBScript, WMI, and ADSI to Automate Windows Administration
VBScript, WMI, and ADSI Unleashed: Using VBScript, WMI, and ADSI to Automate Windows Administration
If you’re a Windows administrator, scripting expertise can liberate you from boring, repetitive work–so you can take on the sophisticated, high-value projects you really want. Top scripting guru Don Jones has written the definitive administrator’s guide to getting results with Microsoft’s key scripting technologies:...
Self-Similar Processes in Telecommunications
Self-Similar Processes in Telecommunications

For the first time the problems of voice services self-similarity are discussed systematically and in detail with specific examples and illustrations.

‘Self-Similar Processes in Telecommunications’ considers the self-similar (fractal and multifractal) models of telecommunication traffic and efficiency...

System Administration Made Easy Guidebook, Release 4.6A/B
System Administration Made Easy Guidebook, Release 4.6A/B
The most commonly performed system administration tasks are explained step-by-step in this guidebook. Eighty percent of the book is operation system/database independent; the rest covers Microsoft SQL Server

About the Author

The R/3 Simplification Group at SAP Labs, Palo Alto, develops or helps
...
Building Websites with Joomla! 1.5 Beta 1
Building Websites with Joomla! 1.5 Beta 1
More than a year has passed since the founding of the Joomla! project. And what an exciting year it has been!

The Joomla! team was organized and has built a solid foundation; it has continued developing Joomla! 1.0.0 to version 1.0.12, and now has the largest developmental leap so far to Joomla! 1.5 in sight. The users of the system have
...
Color Management for Digital Photographers For Dummies (Computer/Tech)
Color Management for Digital Photographers For Dummies (Computer/Tech)
Here's your key to perfect color in digital images

Fine-tune brightness, contrast, and tone with Photoshop® Elements and these tips

Shooting great photos is only half the battle—tweaking the details in your digital darkroom makes the difference between so-so images and...

ATM Technology for Broadband Telecommunications Networks
ATM Technology for Broadband Telecommunications Networks
This textbook presents all the latest information on all aspects of each important component of ATM - the hottest telecommunications technology of this decade. It demonstrates how ATM internetworks several incompatible telecommunications technologies and provide the high-speed, high bandwidth backbone network that the entire telecom industry is...
JavaServer Faces in Action
JavaServer Faces in Action
Helping front-end developers, back-end developers, and architects understand how they can get the most out of JavaServer Faces (JSF), this guide to the new official standard for simplifying Java web development explains what JSF is, how it works, and how it relates to other frameworks and technologies like Struts, Servlets, Portlets, JSP, and...
Result Page: 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy