Home | Amazing | Today | Tags | Publishers | Years | Search 
Spread Spectrum and CDMA: Principles and Applications
Spread Spectrum and CDMA: Principles and Applications
Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.

This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT,...

XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World
XML-Based Integration Using XA-Suite: Unifying Applications and Data in Today's e-Business World

In order for a business to thrive in today’s dynamic world, its computing infrastructure must enable the secure flow of information—not only within the business but also with suppliers and customers. However, many of today’s computing infrastructures suffer from “information chaos” and are unable to support this...

IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
Business Data Communications and Networking: A Research Perspective
Business Data Communications and Networking: A Research Perspective
Research in the area of data communications and networking is well and alive as this collection of contributions show. The book has received enhanced contributions from the authors that published in the inaugural volume of the International Journal of Business Data Communications and Networking (http://www.idea-group.com/ijbdcn). The chapters are...
EJB 3 in Action
EJB 3 in Action
EJB 3 in Action tackles EJB 3 and the Java Persistence API head-on, providing practical code samples, real-life scenarios, best practices, design patterns, and performance tuning tips. This book builds on the contributions and strengths of seminal technologies like Spring, Hibernate, and TopLink.

EJB 3 is the most important innovation...

Professional Team Foundation Server
Professional Team Foundation Server

This book is for project managers, IT administrators, and anyone whose role consists of administering Team Foundation Server on a daily basis, running a software project, setting up users, or handling security.

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of...

Standard Codecs: Image Compression to Advanced Video Coding (Telecommunications)
Standard Codecs: Image Compression to Advanced Video Coding (Telecommunications)
A substantially updated edition of "Video Coding: An Introduction to Standard Codecs", (IEE/1999) this book discusses the growth of digital television technology and the revolution in image and video compression (such as JPEG2000, broadcast TV, video phone), highlighting the need for standardization in processing static and moving images...
The Technology of Video and Audio Streaming, Second Edition
The Technology of Video and Audio Streaming, Second Edition
"As one of the reviewers pointed out, this book is a "much-needed introduction to the breadth and depth of streaming media." I agree. For broadcasters and web developers involved in media delivery across the web, the book could be a very useful first step in understanding the basics of streaming technologies."
European
...
Mastering Data Mining: The Art and Science of Customer Relationship Management
Mastering Data Mining: The Art and Science of Customer Relationship Management
"Berry and Linoff lead the reader down an enlightened path of best practices." -Dr. Jim Goodnight, President and Cofounder, SAS Institute Inc.

"This is a great book, and it will be in my stack of four or five essential resources for my professional work." -Ralph Kimball, Author of The Data Warehouse Lifecycle
...
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cresser, NBC News terrorism analyst
...
Ambient Networks: Co-operative Mobile Networking for the Wireless World
Ambient Networks: Co-operative Mobile Networking for the Wireless World

Ambient Networks defines a new kind of network architecture, which embeds support for co operation and competition between diverse network types within a common control layer. This unified networking concept can adapt to the heterogeneous environments of different radio technologies and service and network environments.  Special...

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy