Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Contemporary Research in E-marketing
Contemporary Research in E-marketing

This innovative text brings the interdisciplinary work of e-marketing to one outlet, and fuels the cross-fertilization of ideas and dissemination of key research concepts.

Contemporary Research in E-Marketing brings the intrinsically inter-disciplinary work of e-marketing, by academic researchers from various fields, to one...

Sensors Applications, Volume 2
Sensors Applications, Volume 2
Taken as a whole, this series covers all major fields of application for commercial sensors, as well as their manufacturing techniques and major types. As such the series does not treat bulk sensors, but rather places strong emphasis on microsensors, microsystems and integrated electronic sensor packages. Each of the individual volumes is tailored...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Active Networks
Active Networks
This book constitutes the thoroughly refereed post-proceedings of the IFIP TC6 5th International Workshop on Active Networks, IWAN 2003, held in Kyoto, Japan, in December 2003.

The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on high performance and...

Manufacturing Execution System - MES
Manufacturing Execution System - MES
The classical factory fades into history as production plants today develop into modern service centers. Problems in management arise for which many companies are not yet prepared: economic efficiency of modern added value is not a property of products alone but of the process. Decisive potential in business now is a question of process capability,...
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)

This book provides a complete and comprehensive overview of 3G UMTS charging services

Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile...

Java Web Services: Up and Running
Java Web Services: Up and Running
This example-driven book offers a thorough introduction to Java's APIs for XML Web Services (JAX-WS) and RESTful Web Services (JAX-RS). Java Web Services: Up and Running takes a clear, pragmatic approach to these technologies by providing a mix of architectural overview, complete working code examples, and short yet precise instructions for...
E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

iCloud: Visual QuickStart Guide
iCloud: Visual QuickStart Guide

Learn how to use Apple's iCloud service to share your content across all your Apple devices. This indispensable guide to Apple's iCloud service walks readers how to share their iTunes songs, photos, books, apps, files, email, contacts, and calendars across their PC, Mac, and iOS devices. Readers will learn how to create documents in...

Serverless Applications with Node.js: Using AWS Lambda and Claudia.js
Serverless Applications with Node.js: Using AWS Lambda and Claudia.js
Summary

Serverless Applications with Node.js walks you through building serverless apps on AWS using JavaScript. Inside, you'll discover what Claudia.js brings to the table as you build and deploy a scalable event-based serverless application, based around a pizzeria that's fully integrated with AWS
...
ITV Handbook: Technologies and Standards
ITV Handbook: Technologies and Standards

Interactive television (iTV)—an evolutionary merging of digital TV and the Internet—is set to take the world by storm! For consumers, iTV technology offers powerful new ways to interact with content providers and merchants. These include enjoying video on demand; participating in online shopping, banking, and...

unlimited object storage image
Result Page: 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy