Home | Amazing | Today | Tags | Publishers | Years | Search 
Optical Switching  and Networking Handbook
Optical Switching and Networking Handbook
Before you begin to read this book, please take a moment to read these introductory comments. The title of the book may be misleading for many people:

For the engineering person, this may sound like the bible of optical networks and switching systems. Not so! This is not an engineering book and will not dig into the gory details of bits
...
Electrical and Electronic Principles and Technology
Electrical and Electronic Principles and Technology
In this book John Bird introduces electrical principles and technology through examples rather than theory - enabling students to develop a sound understanding of the principles needed by technicians in fields such as electrical engineering, electronics and telecommunications. No previous background in engineering is assumed, making this an ideal...
Discovering Bluetooth
Discovering Bluetooth
Everyone is always looking for the “next big thing”—especially in the world of technology. Emerging technologies attract interest because of their future application (how will it affect my life?), because of their potential investment value (it’s good to get in on the ground floor of something big), and, quite frankly,...
Consumer's Guide to Cell Phones & Wireless Service
Consumer's Guide to Cell Phones & Wireless Service
Choosing the right mobile phone and service plan can be overwhelming, particularly if you travel abroad - this truly international guide is ideal for the mobile executive Experts estimate that by 2005 there will be over 1.26 billion wireless phone users around the world. (Source: Cellular Telecommunications Industry Association). It's overwhelming...
Classification and Clustering for Knowledge Discovery (Studies in Computational Intelligence)
Classification and Clustering for Knowledge Discovery (Studies in Computational Intelligence)
Knowledge Discovery today is a significant study and research area. In finding answers to many research questions in this area, the ultimate hope is that knowledge can be extracted from various forms of data around us. This book covers recent advances in unsupervised and supervised data analysis methods in Computational Intelligence for knowledge...
Creative Space: Models of Creative Processes for the Knowledge Civilization Age
Creative Space: Models of Creative Processes for the Knowledge Civilization Age

Creative Space summarizes and integrates the various up-to-date approaches of computational intelligence to knowledge and technology creation including the specific novel feature of utilizing the creative abilities of the human mind, such as tacit knowledge, emotions and instincts, and intuition. It analyzes several important approaches of this...

Coding for Wireless Channels (Information Technology: Transmission, Processing and Storage)
Coding for Wireless Channels (Information Technology: Transmission, Processing and Storage)
Coding for Wireless Channels is an accessible introduction to the theoretical foundations of modern coding theory, with applications to wireless transmission systems. State-of-the-art coding theory is explained using soft (maximum-likelihood) decoding rather than algebraic decoding. Convolutional codes, trellis-coded modulation,...
ASP.Net Database Programming Weekend Crash Course (With CD-ROM)
ASP.Net Database Programming Weekend Crash Course (With CD-ROM)
Written by expert web developers from Price Waterhouse-Coopers, ASP.NET Database Programming Weekend Crash Course will quickly enable you to create dynamic data-driven web applications using Microsoft's exciting new .NET technologies.

Open the book on Friday evening and by Sunday afternoon -- after completing 30 fast, focused lessons...

Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

UML Demystified
UML Demystified
There’s no easier, faster, or more practical way to learn the really tough subjects

UML Demystified explains how to read, model, and use UML to create well-structured, stable software products. This self-teaching guide comes complete with key points, background information, quizzes at the end of each chapter,...

Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy