Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Telephony Demystified
Computer Telephony Demystified
Reshape your world with computer telephony

There’s no stopping the computer telephony (CT) revolution. Everywhere you look, CT is replacing the existing telephony infrastructure with products, systems, and solutions based on off-the-shelf computer technology.

If you’re ready to take advantage of customizable telephony...

AutoCAD 2006 and AutoCAD LT 2006 Bible
AutoCAD 2006 and AutoCAD LT 2006 Bible
If AutoCAD and AutoCAD LT can do it, you can do it too ...

Are you trying AutoCAD for the first time? Upgrading from an earlier version? Switching from another CAD software? Everything you need to know is right here. If you're new to AutoCAD, the Quick Start chapter gets you drawing right away. If you're experienced, go right to
...
Macs All-in-One For Dummies
Macs All-in-One For Dummies

Seven content-rich minibooks cover the key features and tools of your Mac

Macs are easy to use, but this guide helps you take advantage of all the cool features and make the most of your Mac. Fully updated, it covers the newest operating system, Mac OS X Snow Leopard, as well as iLife '09, iWork '09, and much more.

...

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Optical Networks: A Practical Perspective, 3rd Edition
Optical Networks: A Practical Perspective, 3rd Edition

The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this...

C# & VB.NET Conversion Pocket Reference
C# & VB.NET Conversion Pocket Reference

If you are anything like me, the following is a common scenario: You are writing some code not in the language you traditionally use. Although you know a needed command in your language of choice, the keyword in the language you are using is not even remotely similar, and you can't even think of a word to type...

Reliability, Survivability and Quality of Large Scale Telecommunication Systems: Case Study: Olympic Games
Reliability, Survivability and Quality of Large Scale Telecommunication Systems: Case Study: Olympic Games
The design and implementation of large scale telecommunication systems requires the interconnection and integration of diverse subsystems which need to provide a highly reliable system capable of offering high quality services. Over recent years, large scale systems designers have only had to deal with wireline systems and large scale operations...
Routing and Switching: time of convergence
Routing and Switching: time of convergence

This book has been written in precise and technical language with the intention of eliminating marketing hype and other inappropriate descriptions. (Indeed the book is no light read as the topics covered are taken most seriously by myself.) The terminology used is derived from standard use (i.e. internationally approved through the...

Boost.Asio C++ Network Programming
Boost.Asio C++ Network Programming

Enhance your skills with practical examples for C++ network programming

Overview

  • Augment your C++ network programming using Boost.Asio
  • Discover how Boost.Asio handles synchronous and asynchronous programming models.
  • Practical examples of client/server applications.
  • ...
Software Piracy Exposed
Software Piracy Exposed
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software...
Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices
Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices

Explores and analyzes past and current technologies and trends in multimedia communication

Digital natives—those persons born in the digital age—have an ever-widening range of wireless-enabled devices at their disposal. They are the drivers of multimedia communications, continually seeking out the technologies...

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy