Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Recording Engineer's Handbook
The Recording Engineer's Handbook
Every recording starts with tracking. Yet in this day of samples,
loops, and modeling, there’s a whole generation of engineers that
have grown up with little knowledge of microphone technique.
This book tries not only to preserve for history the techniques and
methods of the recording masters, but answers the crying
...
Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs (Communications Engineering Series)
Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs (Communications Engineering Series)
Wi-Fi telephony is the latest, most cost effective, and clearest way of carrying voice data wirelessly. The great news is that it can be integrated seamlessly into the same infrastructures as currently used for computer and telephone data.The digital quality is far above current cellular technologies.

This book will be among the first to
...
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

VMware Horizon Mirage Essentials
VMware Horizon Mirage Essentials

Manage your entire desktop environment with a single management tool – VMware Horizon Mirage

Overview

  • Deliver a centralized Windows image management solution for physical, virtual, and BYOD
  • Migrate seamlessly to new versions of operating systems with minimal user downtime
  • ...
Machine Learning and Knowledge Discovery in Databases: European Conference
Machine Learning and Knowledge Discovery in Databases: European Conference

When in 1986 Yves Kodratoff started the European Working Session on Learning at Orsay, France, it could not be foreseen that the conference would grow year by year and become the premier European conference of the field, attracting submissions from all over the world. The first European Conference on Principles of Data Mining and Knowledge...

The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
There are two camps of service providers who make money off of the residential Internet users today. Camp one is made up of the Googles, Yahoos, and AOLs who are often referred to as “over the top” or WEB 2.0 service providers. This camp doesn’t need IMS, or at least they haven’t shown much interest in IMS. On the other...
CCNP ONT Portable Command Guide (Self-Study Guide)
CCNP ONT Portable Command Guide (Self-Study Guide)
Welcome to ONT! In 2006, Cisco Press came to me and told me, albeit very quietly, that there was going to be a major revision of the CCNP certification exams. Then they asked whether I would be interested in working on a command guide in the same fashion as my previous books for Cisco Press: the Cisco Networking Academy Program ...
A Course in Formal Languages, Automata and Groups (Universitext)
A Course in Formal Languages, Automata and Groups (Universitext)
This book is based on notes for a master’s course given at Queen Mary, University of London, in the 1998/9 session. Such courses in London are quite short, and the course consisted essentially of the material in the first three chapters, together with a two-hour lecture on connections with group theory. Chapter 5 is a...
Developing Web Apps with Haskell and Yesod: Safety-Driven Web Development
Developing Web Apps with Haskell and Yesod: Safety-Driven Web Development

This fast-moving guide introduces web application development with Haskell and Yesod, a potent language/framework combination that supports high-performing applications that are modular, type-safe, and concise. Fully updated for Yesod 1.4, this second edition shows you how Yesod handles widgets, forms, persistence, and RESTful...

Grid Computing
Grid Computing

This book constitutes the thoroughly refereed post-proceedings of the Second European AcrossGrid Conference, AxGrids 2004, held in Nicosia, Cyprus in January 2004.

The 27 revised full papers and 4 revised short papers presented were carefully selected during two rounds of reviewing and improvement from 57 submissions. The papers address...

Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)
Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)

Let’s begin with a quick glimpse into a typical day at a company:

There you are at your desk, wanting to talk with your colleague Steve in another office about a new project you need his help on. You turn to your laptop, switch to a software program, and look at Steve’s presence info. The little bubble next to...

Advanced C# Programming
Advanced C# Programming

Your Definitive Professional Resource

Build solutions for the Microsoft .NET platform quickly and easily with C#--an efficient, object-oriented language. Advanced C# Programming thoroughly explains real-world solutions you can apply to a wide range of business applications or to programming problems. This book also reviews...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy