Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco IOS XR Fundamentals
Cisco IOS XR Fundamentals

Over the last several years, fiscal discipline has really dominated the industry. Both consumers and businesses expect far more from their communications providers than they did just a few years ago. Offering simple telephone dial tone and an Internet connection are not going to be enough for success. At the same time, however, service providers...

Electrical and Electronic Principles and Technology, Third Edition
Electrical and Electronic Principles and Technology, Third Edition
An introductory textbook for students of electronics and electrical engineering

* New colour layout helps navigation and highlights key learning points, formulae and exercises
* 400 worked problems and over 1,300 questions, all with answers
* Fully up to date with the
...
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach

". . . We found Catalysis to be the first comprehensive object-oriented methodology to unify the concepts of objects, frameworks, and component technologies."
John McGehee, Senior Architect, Texas Instruments Works Project

Objects, Components, and Frameworks with UML: The Catalysis Approach is where you will...

Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009
Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009.

The focus of this year's conference has shifted to the legal rather than the deeply technical especially...

The Internet of Things: Key Applications and Protocols
The Internet of Things: Key Applications and Protocols

An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use...

Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems
Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems

The 16th International Conference on Applications of Natural Language to Information Systems (NLDB 2011) was held during June 28–30, 2011, at the University of Alicante, Spain. Since the first NLDB conference in 1995, the main goal has been to provide a forum for the discussion and dissemination of research on the integration of...

Intelligent Image Processing
Intelligent Image Processing
Intelligent Image Processing describes the EyeTap technology that allows non-invasive tapping into the human eye through devices built into eyeglass frames. This isn't merely about a computer screen inside eyeglasses, but rather the ability to have a shared telepathic experience among viewers. Written by the developer of the EyeTap principle, this...
Deploying IPv6 in 3GPP Networks: Evolving Mobile Broadband from 2G to LTE and Beyond
Deploying IPv6 in 3GPP Networks: Evolving Mobile Broadband from 2G to LTE and Beyond

Deploying IPv6 in 3GPP Networks – Evolving Mobile Broadband from 2G to LTE and Beyond 

A practical guide enabling mobile operators to deploy IPv6 with confidence

The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of...

Benchmarking Peer-to-Peer Systems: Understanding Quality of Service in Large-Scale Distributed Systems (Lecture Notes in Computer Science / Computer Communication Networks and Telecommunications)
Benchmarking Peer-to-Peer Systems: Understanding Quality of Service in Large-Scale Distributed Systems (Lecture Notes in Computer Science / Computer Communication Networks and Telecommunications)

Peer-to-peer systems are now widely used and have become the focus of attention for many researchers over the past decade. A number of algorithms for decentralized search, content distribution, and media streaming have been developed. This book provides fundamental concepts for the benchmarking of those algorithms in peer-to-peer systems. It...

Electrical and Electronic Principles and Technology
Electrical and Electronic Principles and Technology

For students following pre-degree vocational electronic and electrical engineering courses at levels 2 and 3; foundation degree students and undergraduates.

The BTEC National Engineering course has a brand new syllabus and this text is now fully updated to reflect these changes. It introduces electrical principles and...

Mobile Wireless Communications
Mobile Wireless Communications
A wide range of real-world examples illustrates the theoretical aspects of this tutorial introduction to digital mobile wireless networks. In particular, 2.5G and 3G packet-switched systems are discussed in detail, as are wireless LANs and personal-area networks. Many worked examples and homework exercises are provided, and a solutions manual is...
Result Page: 51 50 49 48 47 46 45 44 43 42 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy