Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Wireless Communications: 4G Technologies
Advanced Wireless Communications: 4G Technologies
The wireless community is on the verge of the standardization of fourth generation (4G) systems.  Research has generated a number of solutions for significant improvement of system performance.  The development of enabling technologies such as adaptive coding and modulation, iterative (turbo) decoding algorithms and space-time coding,...
Foundation ActionScript for Flash 8
Foundation ActionScript for Flash 8
ActionScript is the native scripting language of Flash. ActionScript knowledge is essential within the world of Flash design and development, as Flash remains a leading tool for cutting-edge interactive design and development.

ActionScript is what gives Flash its power, but with that power comes a certain level of complexity, which
...
Innovations in Machine Learning: Theory and Applications (Studies in Fuzziness and Soft Computing)
Innovations in Machine Learning: Theory and Applications (Studies in Fuzziness and Soft Computing)
The study of innovation – the development of new knowledge and artifacts – is of interest to scientists and practitioners. Innovations change the day-to-day lives of individuals, transform economies, and even create new societies. The conditions triggering innovation and the innovation process itself set the stage for economic...
Computational Geometry: Algorithms and Applications
Computational Geometry: Algorithms and Applications
This well-accepted introduction to computational geometry is a textbook for high-level undergraduate and low-level graduate courses. The focus is on algorithms and hence the book is well suited for students in computer science and engineering. Motivation is provided from the application areas: all solutions and techniques from computational...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Building Cocoa Applications : A Step by Step Guide
Building Cocoa Applications : A Step by Step Guide
Building Cocoa Applications is an ideal book for serious developers who want to write programs for the Mac OS X using Cocoa. It's a no-nonsense, hands-on text that's filled with examples -- not only simple and self-contained examples of individual Cocoa features, but extended examples of complete applications with enough sophistication...
Knots and Links
Knots and Links
Knot theory is the study of embeddings of circles in space. It is a subject in which naturally occurring questions are often so simple to state that they can be explained to a child, yet finding answers may require ideas from the forefront of research. It is a subject of both depth and subtlety.

The subject started to develop
...
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
unlimited object storage image
Result Page: 320 319 318 317 316 315 314 313 312 311 310 309 308 307 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy