Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Canon EOS Digital Rebel XSi/450D For Dummies (Computer/Tech)
Canon EOS Digital Rebel XSi/450D For Dummies (Computer/Tech)

Here's how to take control of all your cool camera's features

Your Digital Rebel XSi/450D delivers an exciting new way to take pictures, and this book shows you how to make every shot a winner! Even if you have no clue what aperture, white balance, or ISO mean, you'll soon be switching easily between automatic and...

Cisco Unified Customer Voice Portal: Building Unified Contact Centers (Networking Technology: IP Communications)
Cisco Unified Customer Voice Portal: Building Unified Contact Centers (Networking Technology: IP Communications)

The definitive guide to deploying Cisco Unified Customer Voice Portal IVRs in any contact center environment

 

Thousands of companies are replacing legacy ACD/TDM-based contact centers with pure IP-based unified contact center solutions. One of these...

Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
CCNA Routing and Switching Review Guide: Exams 100-101, 200-101, and 200-120
CCNA Routing and Switching Review Guide: Exams 100-101, 200-101, and 200-120

Todd Lammle's focused, concise review guide, updated for the latest CCNA exams

CCNA is one of the most sought after certifications for IT professionals. If you're preparing for the CCNA Routing and Switching certification, this Sybex review guide offers the best quick review available. Organized by exam objective,...

Understanding the Linux Kernel (2nd Edition)
Understanding the Linux Kernel (2nd Edition)

In the spring semester of 1997, we taught a course on operating systems based on Linux 2.0. The idea was to encourage students to read the source code. To achieve this, we assigned term projects consisting of making changes to the kernel and performing tests on the modified version. We also wrote course notes...

Digital Control in Power Electronics (Synthesis Lectures on Power Electronics)
Digital Control in Power Electronics (Synthesis Lectures on Power Electronics)

This book presents the reader, whether an electrical engineering student in power electronics or a design engineer, some typical power converter control problems and their basic digital solutions, based on the most widespread digital control techniques. The presentation is focused on different applications of the same power converter...

Cisco Field Manual: Catalyst Switch Configuration
Cisco Field Manual: Catalyst Switch Configuration

A complete, concise reference for implementing the most important features of the Cisco Catalyst family of switches

* Review detailed and comparative configuration steps for features of the COS and Cisco IOS Software operating systems
* Understand basic system and operating system management
* Configure Ethernet, EtherChannel,
...

Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)
Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition)

Radia Perlman's Interconnections is recognized as a leading text on networking theory and practice. It provides authoritative and comprehensive information on general networking concepts, routing algorithms and protocols, addressing, and the mechanics of bridges, routers, switches, and hubs. This Second...

Crowd Behavior Simulation of Pedestrians During Evacuation Process: DEM-Based Approach (SpringerBriefs in Applied Sciences and Technology)
Crowd Behavior Simulation of Pedestrians During Evacuation Process: DEM-Based Approach (SpringerBriefs in Applied Sciences and Technology)

This book introduces the use of the distinct element method (DEM) in modeling crowd behavior and simulating evacuation processes. Focusing on the mathematical computation of the uncertain behavior of evacuees, which is switching action behavior, it subsequently reproduces the crowd evacuation process under several conjectural...

Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory provides a tutorial on the basic of network coding theory. It presents the material in a transparent manner without unnecessarily presenting all the results in their full generality. Store-and-forward had been the predominant technique for transmitting information through a network until its optimality was refuted by network...
Relativistic Reality: A Modern View (Knots and Everything, Vol 12)
Relativistic Reality: A Modern View (Knots and Everything, Vol 12)
This book has its origins in my leaving applied physics in 1969 to teach at a small college and ponder the foundations of physics without pressure, even if with limited time caused by a heavy teaching load. Richard Feynman had lectured weekly during the two years I spent at Hughes Labs in Malibu, after graduating from Engineering Physics at...
CCSP: Securing Cisco IOS Networks Study Guide (642-501)
CCSP: Securing Cisco IOS Networks Study Guide (642-501)
Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides:
  • In-depth coverage of every SECUR exam objective
  • Practical information on Cisco security solutions
  • Hundreds of challenging practice...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy