 |
|
 WiMAX Security and Quality of Service: An End-to-End Perspective
WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and... |  |  Complex Variables and the Laplace Transform for Engineers
Widely acclaimed text on essential engineering mathematics. Theory of complex variables, Cauchy-Riemann equations, conformal mapping, multivalued functions, etc. Also Fourier and Laplace Transform theory, its applications to engineering, including integrals, linear integrodifferential equations, Z Transform, much more. Many excellent... |  |  Google (Corporations That Changed the World)
It's the American dream—start a company, make a fortune, and retire early. But to become multimillionaires in their twenties, as Google founders Larry Page and Sergey Brin did, boggles the mind. All they did, after all, is come up with a better way to search for things on the Internet, right? Only in part. No company achieves a... |
|
|
|
 Light-Emitting Diodes
Light emitting diodes (LEDs) are devices that are used in a myriad of applications, such as indicator lights in instruments, signage, illuminations, and communication. This graduate textbook covers all aspects of the technology and physics of infrared, visible-spectrum, and white light-emitting diodes (LEDs) made from III-V semiconductors. It... |  |  Poser 7 Revealed: The efrontier Official Guide
Now you can conquer each essential feature of Poser 7! Poser 7 Revealed helps you develop the skills you need to create, render, and animate scenes and projects using the amazing tools offered by Poser 7. This hands-on guide provides you with step-by-step tutorials for each task, followed by projects that allow you to use each new skill on... |  |  Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |
|
Result Page: 683 682 681 680 679 678 677 676 675 674 673 672 671 670 669 668 667 666 665 |