Home | Amazing | Today | Tags | Publishers | Years | Search 
Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
*A practical engineer’s reference that puts the key information at your fingertips
*Covers essential data, techniques and working practice
*This update covers the latest international regulations

Newnes Data Communications Pocket Book is a remarkable toolkit for engineers, IT professionals, managers and students. The wide
...
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Intelligent Image Processing
Intelligent Image Processing
Intelligent Image Processing describes the EyeTap technology that allows non-invasive tapping into the human eye through devices built into eyeglass frames. This isn't merely about a computer screen inside eyeglasses, but rather the ability to have a shared telepathic experience among viewers. Written by the developer of the EyeTap principle, this...
Microsoft SQL Server 2000 DTS
Microsoft SQL Server 2000 DTS
Microsoft SQL Server 2000 Data Transformation Services covers all facets in the development of data transformations with DTS. The reader will learn how to create each of the DTS tasks, both in the User Interface supplied with SQL Server and through the object model using Visual Basic or VBScript.

Microsoft SQL Server 2000 Data Transformation...

Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
This book is motivated by the following convictions:

1) Quantitative risk assessment (QRA) can be a powerful discipline for improving risk management decisions and policies.
2) Poorly conducted QRAs can produce results and recommendations that are worse than useless.
3) Sound risk assessment methods provide the benefits of QRA
...
Modular Java: Creating Flexible Applications with OSGi and Spring
Modular Java: Creating Flexible Applications with OSGi and Spring
The secret weapon for attacking complexity in any project is to break it down into smaller, cohesive, and more easily digestible pieces. With Modular Java, you can easily develop applications that are more flexible, testable, maintainable, and comprehensible.

Modular Java is a pragmatic guide to developing modular
...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Second Life For Dummies (Computer/Tech)
Second Life For Dummies (Computer/Tech)
You’ve heard all about Second Life. Maybe you’ve already jumped with both feet—and gotten stuck. Or maybe you’re a Second Life veteran who wants to build something or run a business. Fear not! Second Life For Dummies is hear to hold your hand, pat your back, and cheer you on through this new and enchanting reality....
Seam Framework: Experience the Evolution of Java EE (2nd Edition) (JBoss Series)
Seam Framework: Experience the Evolution of Java EE (2nd Edition) (JBoss Series)
Fully Updated to Cover Major Enhancements to Seam 2.x

 

In Seam Framework, Second Edition, the authors of the leading guide to Seam programming have systematically updated their text to reflect the major improvements introduced...

The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
What Top Managers Really Need to Know about Information Technology

"These kinds of productivity principles are not mere theory. When we put these same principles into effect, our productivity went up more than we had thought possible. And our employee morale went up, too. It became easier to write code the right way and harder to make...

Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Information theory lies at the heart of modern technology, underpinning all communications, networking, and data storage systems. This book sets out, for the first time, a complete overview of both classical and quantum information theory. Throughout, the reader is introduced to key results without becoming lost in mathematical details. Opening...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy